A threshold-based model for privacy protection in cloud computing

被引:0
|
作者
Ren X.-Y. [1 ]
Chen L.-J. [1 ]
Zhang J.-F. [1 ]
Ma X.-D. [2 ]
机构
[1] College of Computer Nanjing, University of Posts and Telecommunications
[2] Jiangsu YiTong HIGH-Tech Co., LTD
关键词
(n+1; t+1) threshold scheme; Authorization; Cloud computing; Key matrix; Privacy; Role-based access control; Vector;
D O I
10.4156/aiss.vol3.issue3.20
中图分类号
学科分类号
摘要
Privacy for cloud computing has become an important issue in recent years. In this paper, we propose a threshold-based model for privacy protection in cloud computing with a particular (n +1, t +1) secret sharing scheme which is bases on the matrix and vector. We show how our (n +1, t +1) secret sharing scheme can be applied to protect privacy. First, we assign each row of the matrix as a key of vector. Next, we make use of the linear correlation and linear independence of the vector to evaluate the rank of the key matrix. As a result, only the data owner together with t cloud service providers who hold the linearly independent vectors can recover the key matrix. According to the obtained key, the corresponding role is given the authority to operate the data by role-based authorization mechanism. Finally, we analyze the security of this model.
引用
收藏
页码:163 / 168
页数:5
相关论文
共 50 条
  • [11] ROBUST AND PRIVACY PROTECTION AUTHENTICATION IN CLOUD COMPUTING
    Huang, Jheng-Jia
    Juang, Wen-Shenq
    Fan, Chun-I
    Liaw, Horng-Twu
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (11): : 4247 - 4261
  • [12] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [14] An effective cloud computing model enhancing privacy in cloud computing
    Chawki, Mohamed
    INFORMATION SECURITY JOURNAL, 2024, 33 (06): : 635 - 658
  • [15] A Medical Data Privacy Protection Scheme Based on Blockchain and Cloud Computing
    Huang, Liang
    Lee, Hyung-Hyo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [16] XML privacy protection model based on cloud storage
    Guo, Lihong
    Wang, Jian
    Du, He
    COMPUTER STANDARDS & INTERFACES, 2014, 36 (03) : 454 - 464
  • [17] ASTAW: Auto-scaling threshold-based approach for web application in cloud computing environment
    Fallah, Monireh
    Arani, Mostafa Ghobaei
    International Journal of u- and e- Service, Science and Technology, 2015, 8 (03) : 221 - 230
  • [18] A Privacy-Leakage-Tolerance based Noise Enhancing Strategy for Privacy Protection in Cloud Computing
    Zhang, Gaofeng
    Yang, Yun
    Chen, Jinjun
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1 - 8
  • [19] Privacy Based Data Publishing Model for Cloud Computing Environment
    Bibal Benifa, J. V.
    Venifa Mini, G.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (04) : 2215 - 2241
  • [20] Privacy Based Data Publishing Model for Cloud Computing Environment
    J. V. Bibal Benifa
    G. Venifa Mini
    Wireless Personal Communications, 2020, 113 : 2215 - 2241