A threshold-based model for privacy protection in cloud computing

被引:0
|
作者
Ren X.-Y. [1 ]
Chen L.-J. [1 ]
Zhang J.-F. [1 ]
Ma X.-D. [2 ]
机构
[1] College of Computer Nanjing, University of Posts and Telecommunications
[2] Jiangsu YiTong HIGH-Tech Co., LTD
关键词
(n+1; t+1) threshold scheme; Authorization; Cloud computing; Key matrix; Privacy; Role-based access control; Vector;
D O I
10.4156/aiss.vol3.issue3.20
中图分类号
学科分类号
摘要
Privacy for cloud computing has become an important issue in recent years. In this paper, we propose a threshold-based model for privacy protection in cloud computing with a particular (n +1, t +1) secret sharing scheme which is bases on the matrix and vector. We show how our (n +1, t +1) secret sharing scheme can be applied to protect privacy. First, we assign each row of the matrix as a key of vector. Next, we make use of the linear correlation and linear independence of the vector to evaluate the rank of the key matrix. As a result, only the data owner together with t cloud service providers who hold the linearly independent vectors can recover the key matrix. According to the obtained key, the corresponding role is given the authority to operate the data by role-based authorization mechanism. Finally, we analyze the security of this model.
引用
收藏
页码:163 / 168
页数:5
相关论文
共 50 条
  • [1] A Threshold-based Dynamic Resource Allocation Scheme for Cloud Computing
    Lin, Weiwei
    Wang, James Z.
    Liang, Chen
    Qi, Deyu
    PEEA 2011, 2011, 23
  • [2] Privacy and Trust in Cloud Database using Threshold-Based Secret Sharing
    Dutta, Rahul
    Annappa, B.
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 800 - 805
  • [3] Energetic SSource Allotment Scheme for Cloud Computing using Threshold-based
    Chouhan, Pappu Singh
    Samvatsar, Makrand
    Singh, Upendra
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 638 - 644
  • [4] DATA PROTECTION AND PRIVACY PROTECTION OF ADVERTISING BASED ON CLOUD COMPUTING PLATFORM
    Chen, Zhishe
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 3484 - 3488
  • [5] Time Efficient Dynamic Threshold-based load balancing technique for cloud computing
    Mishra, Sambit Kumar
    Khan, Md Akram
    Sahoo, Bibhudatta
    Puthal, Deepak
    Obaidat, Mohammad S.
    Hsiao, K. F.
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS), 2017, : 161 - 165
  • [6] Distributed Threshold-based Offloading for Large-Scale Mobile Cloud Computing
    Qin, Xudong
    Li, Bin
    Ying, Lei
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,
  • [7] Cloud computing data privacy protection method based on blockchain
    He, Yingjun
    Ouyang, Wenhui
    Li, Shaolong
    Wang, Lin
    Zhou, Jing
    Su, Wenwei
    Li, Shenzhang
    Mei, Donghui
    Shi, Yan
    Jin, Yanxu
    Li, Chenglin
    Ren, Yonghui
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (05) : 480 - 492
  • [8] Threshold-based Queuing System for Performance Analysis of Cloud Computing System with Dynamic Scaling
    Shorgin, Sergey Ya.
    Pechinkin, Alexander V.
    Samouylov, Konstantin E.
    Gaidamaka, Yuliya V.
    Gudkova, Irina A.
    Sopin, Eduard S.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE OF NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2014 (ICNAAM-2014), 2015, 1648
  • [9] Efficient Distributed Threshold-Based Offloading for Large-Scale Mobile Cloud Computing
    Qin, Xudong
    Li, Bin
    Ying, Lei
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2023, 31 (01) : 308 - 321
  • [10] Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things
    Song, Lin
    Miao, Yinbin
    Weng, Jian
    Choo, Kim-Kwang Raymond
    Liu, Ximeng
    Deng, Robert H.
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (15) : 13598 - 13611