A threshold-based model for privacy protection in cloud computing

被引:0
|
作者
Ren X.-Y. [1 ]
Chen L.-J. [1 ]
Zhang J.-F. [1 ]
Ma X.-D. [2 ]
机构
[1] College of Computer Nanjing, University of Posts and Telecommunications
[2] Jiangsu YiTong HIGH-Tech Co., LTD
关键词
(n+1; t+1) threshold scheme; Authorization; Cloud computing; Key matrix; Privacy; Role-based access control; Vector;
D O I
10.4156/aiss.vol3.issue3.20
中图分类号
学科分类号
摘要
Privacy for cloud computing has become an important issue in recent years. In this paper, we propose a threshold-based model for privacy protection in cloud computing with a particular (n +1, t +1) secret sharing scheme which is bases on the matrix and vector. We show how our (n +1, t +1) secret sharing scheme can be applied to protect privacy. First, we assign each row of the matrix as a key of vector. Next, we make use of the linear correlation and linear independence of the vector to evaluate the rank of the key matrix. As a result, only the data owner together with t cloud service providers who hold the linearly independent vectors can recover the key matrix. According to the obtained key, the corresponding role is given the authority to operate the data by role-based authorization mechanism. Finally, we analyze the security of this model.
引用
收藏
页码:163 / 168
页数:5
相关论文
共 50 条
  • [31] Wind power prediction method based on cloud computing and data privacy protection
    Zhang, Lei
    Zhu, Shaoming
    Su, Shen
    Chen, Xiaofeng
    Yang, Yan
    Zhou, Bing
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [32] Static Group Privacy Protection Mechanism Based on Cloud Model
    Zhai, Ruxiang
    Zhang, Kun
    Liu, Mingjun
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 970 - 974
  • [33] A dynamic group privacy protection mechanism based on cloud model
    Zhai, Ruxiang
    Zhang, Kun
    Liu, Mingjun
    PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT), 2015, : 83 - 88
  • [34] Development of a Security Education Model System for Cloud Computing and Data Security and Privacy Protection
    Jia, Rui
    Ni, Xiaoli
    Shao, Xiaoyi
    Zhang, Ting
    Qi, Qunkun
    WIRELESS PERSONAL COMMUNICATIONS, 2023,
  • [35] SeCoM: An Outsourced Cloud-Based Secure Communication Model for Advanced Privacy Preserving Data Computing and Protection
    Gupta, Ishu
    Saxena, Deepika
    Singh, Ashutosh Kumar
    Lee, Chung-Nan
    IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 5130 - 5141
  • [36] Distributed Threshold-based Offloading for Heterogeneous Mobile Edge Computing
    Qin, Xudong
    Xie, Qiaomin
    Li, Bin
    2023 IEEE 43RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS, 2023, : 202 - 213
  • [37] A threshold-based load balancing algorithm for grid computing systems
    El-Zoghdy, S.
    Elnashar, Alaa
    JOURNAL OF HIGH SPEED NETWORKS, 2015, 21 (04) : 237 - 257
  • [38] Mobile cloud computing based privacy protection in location-based information survey applications
    Zhang, Hao
    Yu, Nenghai
    Wen, Yonggang
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1006 - 1025
  • [39] A Privacy Filtering and Processing Model in Cloud Computing
    Tao, Linbo
    Shen, Jianjing
    Liu, Bo
    Guo, Xiaofeng
    PROCEEDINGS OF 2016 9TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2016, : 182 - 187
  • [40] Data Integrity and Privacy Model in Cloud Computing
    Al-Jaberi, Mohammed Faez
    Zainal, Anazida
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 280 - 284