PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments

被引:6
|
作者
Lin, Li [1 ,2 ,3 ]
Liu, Ting-Ting [1 ,2 ]
Li, Shuang [1 ,2 ]
Magurawalage, Chathura M. Sarathchandra [4 ]
Tu, Shan-Shan [1 ,2 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Coll Comp Sci, Beijing 100124, Peoples R China
[2] Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
[3] Natl Engn Lab Classified Informat Secur Protect, Beijing 100124, Peoples R China
[4] Univ Essex, Dept Comp Sci & Elect Engn, Colchester CO4 3SQ, Essex, England
来源
IEEE ACCESS | 2018年 / 6卷
基金
美国国家科学基金会;
关键词
Data privacy protection; access control; attribute fuzzy grouping; MULTI-AUTHORITY; ENCRYPTION; SYSTEMS; STORAGE;
D O I
10.1109/ACCESS.2017.2780763
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data privacy protection is crucial to cloud computing since privacy leakage may prevent users from using cloud services. To ensure data privacy, we propose PriGuarder, a novel privacy-aware access control method. This method spans the three stages of a cloud service, i.e., user registration, data creation, and data access. At each stage, users can choose two modes to interact with the cloud service provider, i.e., direct or indirect. With the indirect mode, an attribute fuzzy grouping scheme is introduced to ensure user identity privacy and attribute privacy in all the three stages. Furthermore, exploiting data encryption and timestamp techniques, new access control protocols are proposed to regulate interactions between users and the cloud service provider. We illustrate the use of our method in the context of Amazon S3. Theoretical analysis and comprehensive simulation experiments have been conducted, which demonstrate the efficacy of PriGuarder.
引用
收藏
页码:1882 / 1893
页数:12
相关论文
共 50 条
  • [1] A Formal Specification Approach of Privacy-aware Attribute Based Access Control (Pa-ABAC) Model for Cloud Computing
    Ed-Daibouni, M.
    Lebbat, A.
    Tallal, S.
    Medromi, H.
    PROCEEDINGS OF 2016 THIRD INTERNATIONAL CONFERENCE ON SYSTEMS OF COLLABORATION (SYSCO), 2016, : P1 - P5
  • [2] THE PRIVACY-AWARE ACCESS CONTROL SYSTEM USING ATTRIBUTE-AND ROLE-BASED ACCESS CONTROL IN PRIVATE CLOUD
    Mon, Ei Ei
    Naing, Thinn Thu
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 447 - 451
  • [3] Privacy-aware Role Based Access Control
    Ni, Qun
    Trombetta, Alberto
    Bertino, Elisa
    Lobo, Jorge
    SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 41 - 50
  • [4] Packet:a privacy-aware access control policy composition method for services composition in cloud environments
    Li LIN
    Jian HU
    Jianbiao ZHANG
    Frontiers of Computer Science, 2016, 10 (06) : 1142 - 1157
  • [5] Packet: a privacy-aware access control policy composition method for services composition in cloud environments
    Li Lin
    Jian Hu
    Jianbiao Zhang
    Frontiers of Computer Science, 2016, 10 : 1142 - 1157
  • [6] Packet: a privacy-aware access control policy composition method for services composition in cloud environments
    Lin, Li
    Hu, Jian
    Zhang, Jianbiao
    FRONTIERS OF COMPUTER SCIENCE, 2016, 10 (06) : 1142 - 1157
  • [7] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Calo, Seraphin B.
    IEEE SECURITY & PRIVACY, 2009, 7 (04) : 35 - 43
  • [8] Conditional privacy-aware role based access control
    Ni, Qun
    Lin, Dan
    Bertino, Elisa
    Lobo, Jorge
    COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 72 - +
  • [9] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Brodie, Carolyn
    Karat, Clare-Marie
    Karat, John
    Trombetta, Alberto
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)
  • [10] Privacy-aware multi-tenant access control for cloud workflow
    Wen Y.
    Liu J.
    Dou W.
    Chen A.
    Zhou M.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (04): : 894 - 900