A threshold-based model for privacy protection in cloud computing

被引:0
|
作者
Ren X.-Y. [1 ]
Chen L.-J. [1 ]
Zhang J.-F. [1 ]
Ma X.-D. [2 ]
机构
[1] College of Computer Nanjing, University of Posts and Telecommunications
[2] Jiangsu YiTong HIGH-Tech Co., LTD
关键词
(n+1; t+1) threshold scheme; Authorization; Cloud computing; Key matrix; Privacy; Role-based access control; Vector;
D O I
10.4156/aiss.vol3.issue3.20
中图分类号
学科分类号
摘要
Privacy for cloud computing has become an important issue in recent years. In this paper, we propose a threshold-based model for privacy protection in cloud computing with a particular (n +1, t +1) secret sharing scheme which is bases on the matrix and vector. We show how our (n +1, t +1) secret sharing scheme can be applied to protect privacy. First, we assign each row of the matrix as a key of vector. Next, we make use of the linear correlation and linear independence of the vector to evaluate the rank of the key matrix. As a result, only the data owner together with t cloud service providers who hold the linearly independent vectors can recover the key matrix. According to the obtained key, the corresponding role is given the authority to operate the data by role-based authorization mechanism. Finally, we analyze the security of this model.
引用
收藏
页码:163 / 168
页数:5
相关论文
共 50 条
  • [41] Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing
    Hong, Ming-quan
    Zhao, Wen-bo
    Wang, Peng-yu
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 152 - 157
  • [42] Two Level Based Privacy Protection Approach for Internet of Things Users in Cloud Computing
    Alarabi, Shatha
    Alaradi, Sara
    Almuzeri, Shahad
    Innab, Nisreen
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [43] Marketing data security and privacy protection based on federated gamma in cloud computing environment
    Zhang C.
    Pan Z.
    Hou C.
    International Journal of Intelligent Networks, 2023, 4 : 261 - 271
  • [44] Kernel interpolation-based technique for privacy protection of pluggable data in cloud computing
    Bangare M.L.
    Joshi S.A.
    International Journal of Cloud Computing, 2020, 9 (2-3) : 355 - 374
  • [45] Research on patient privacy protection for medical data in cloud computing
    Wu, D. (yzwdf@yeah.net), 1600, Academy Publisher, P.O.Box 40,, OULU, 90571, Finland (08):
  • [46] Key Research Issues for Privacy Protection and Preservation in Cloud Computing
    Zhang, Gaofeng
    Yang, Yun
    Zhang, Xuyun
    Liu, Chang
    Chen, Jinjun
    SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, : 47 - 54
  • [47] Privacy Protection Smartcard. Authentication Scheme in Cloud Computing
    Fan Kai
    Deng Hai
    Li Hui
    Yang Yintang
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (01) : 41 - 45
  • [48] Privacy protection and integrity verification of aggregate queries in cloud computing
    Jun Hong
    Tao Wen
    Quan Guo
    Zhengwang Ye
    Ying Yin
    Cluster Computing, 2019, 22 : 5763 - 5773
  • [49] Privacy Protection Method in the Era of Cloud Computing and Big Data
    Liu, Ying
    INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND APPLICATION (ICETA 2015), 2015, 22
  • [50] A Privacy Protection Solution for the Balance of Performance and Security in Cloud Computing
    Ji Yi-mu
    Kang Jia-bang
    Liu Hai
    Pan Qiao-yu
    Sun Yan-peng
    Kuang Zizhuo
    Zhao Chuanxin
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2013 WORKSHOPS, 2014, 8182 : 335 - 345