A threshold-based model for privacy protection in cloud computing

被引:0
|
作者
Ren X.-Y. [1 ]
Chen L.-J. [1 ]
Zhang J.-F. [1 ]
Ma X.-D. [2 ]
机构
[1] College of Computer Nanjing, University of Posts and Telecommunications
[2] Jiangsu YiTong HIGH-Tech Co., LTD
关键词
(n+1; t+1) threshold scheme; Authorization; Cloud computing; Key matrix; Privacy; Role-based access control; Vector;
D O I
10.4156/aiss.vol3.issue3.20
中图分类号
学科分类号
摘要
Privacy for cloud computing has become an important issue in recent years. In this paper, we propose a threshold-based model for privacy protection in cloud computing with a particular (n +1, t +1) secret sharing scheme which is bases on the matrix and vector. We show how our (n +1, t +1) secret sharing scheme can be applied to protect privacy. First, we assign each row of the matrix as a key of vector. Next, we make use of the linear correlation and linear independence of the vector to evaluate the rank of the key matrix. As a result, only the data owner together with t cloud service providers who hold the linearly independent vectors can recover the key matrix. According to the obtained key, the corresponding role is given the authority to operate the data by role-based authorization mechanism. Finally, we analyze the security of this model.
引用
收藏
页码:163 / 168
页数:5
相关论文
共 50 条
  • [21] Research on the Strategies of Data Privacy Protection in Cloud Computing
    Li, Yi
    Zhang, Bo
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 475 - 481
  • [22] A Survey of Data Security and Privacy Protection in Cloud Computing
    Yuan, Zhongbing
    Liu, Xiaojun
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 647 - 651
  • [23] Dynamic searchable encryption with privacy protection for cloud computing
    Ocansey, Selasi Kwame
    Ametepe, Wolali
    Li, Xiao Wei
    Wang, Changda
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (01)
  • [24] Privacy Protection Smartcard Authentication Scheme in Cloud Computing
    FAN Kai
    DENG Hai
    LI Hui
    YANG Yintang
    ChineseJournalofElectronics, 2018, 27 (01) : 41 - 45
  • [25] A Scheme of Memory Privacy Protection in Cloud Computing Environment
    LIU Kehao
    CAO Ming
    FU Nan
    MA Jing
    Wuhan University Journal of Natural Sciences, 2015, 20 (04) : 307 - 312
  • [26] Security and privacy protection in cloud computing: Discussions and challenges
    Sun, PanJun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 160
  • [27] Research on Privacy Protection Approach for Cloud Computing Environments
    Li, Xiaohui
    Liang, Hongxing
    Jia, Dan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 113 - 119
  • [28] Survey of Privacy Data Protection Technology in Cloud Computing
    Wang, Yang
    2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR EDUCATION (ICTE 2016), 2016, : 143 - 145
  • [29] Dynamic Threshold-Based Dynamic Resource Allocation Using Multiple VM Migration for Cloud Computing Systems
    Seth, Sonam
    Singh, Nipur
    INFORMATION, COMMUNICATION AND COMPUTING TECHNOLOGY, 2017, 750 : 106 - 116
  • [30] A historical probability based noise generation strategy for privacy protection in cloud computing
    Zhang, Gaofeng
    Yang, Yun
    Chen, Jinjun
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (05) : 1374 - 1381