Cloud-Based Identity Attribute Service with Privacy Protection in Cyberspace

被引:4
|
作者
Zou, Xiang [1 ]
Chen, Bing [1 ]
Jin, Bo [1 ]
机构
[1] Minist Publ Secur, Res Inst 3, Shanghai 200031, Peoples R China
关键词
Identity attribute service; Privacy protection; Identity management; Cyber identity; Cloud Service;
D O I
10.1016/j.proeng.2012.01.105
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
With the cyber advancing rapidly, huge scale cyber trusted service and privacy protection has been more and more important. The paper presents the cloud-based service method for user identity attribute service in cyberspace, and the method based on the service model of multilevel cyber identity management provides user identity attribute service for cyber applications, and implements the mechanism of multilevel privacy protection policy, and presents the authentication service of the eID certificate and the coherence authentication service of the eID identity. As a result, security of web applications along with user privacy is protected by providing fine-grained access control with user identity attribute and strong authentication services. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of Harbin University of Science and Technology
引用
收藏
页码:1160 / 1164
页数:5
相关论文
共 50 条
  • [1] Research on Cloud-Based LBS and Location Privacy Protection
    Yan, Yan
    Wang, Wan Jun
    INDUSTRIAL ENGINEERING, MACHINE DESIGN AND AUTOMATION (IEMDA 2014) & COMPUTER SCIENCE AND APPLICATION (CCSA 2014), 2015, : 9 - 15
  • [2] CloudProtect - A Cloud-based Software Protection Service
    Schaad, Andreas
    Grohmann, Bjeorn
    Winzenried, Oliver
    PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19), 2019, : 219 - 221
  • [3] Deploying Privacy as a Service within a Cloud-Based Framework
    da Silva, Jorge Luiz
    Assis, Marcio Miranda
    Braga, Alexandre
    Moraes, Regina
    2019 9TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2019, : 153 - 156
  • [4] A Cloud-Based Crime Reporting System with Identity Protection
    Shih, Tzay-Farn
    Chen, Chin-Ling
    Syu, Bo-Yan
    Deng, Yong-Yuan
    SYMMETRY-BASEL, 2019, 11 (02):
  • [5] Privacy protection based on encrypting sensitive attribute for cloud data
    Zhang, Lifen
    Dai, Jun
    Journal of Computational Information Systems, 2014, 10 (03): : 1085 - 1092
  • [6] Privacy Protection Based Access Control Scheme in Cloud-Based Services
    Fan, Kai
    Tian, Qiong
    Wang, Junxiong
    Li, Hui
    Yang, Yintang
    CHINA COMMUNICATIONS, 2017, 14 (01) : 61 - 71
  • [7] Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol
    Fan, Kai
    Wang, Wei
    Wang, Yue
    Li, Hui
    Yang, Yintang
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [8] Privacy Protection based Access Control Scheme in Cloud-based Services
    Fan, Kai
    Tian, Qiong
    Huang, Nana
    Wang, Yue
    Li, Hui
    Yang, Yintang
    2016 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2016,
  • [9] Privacy Protection Based Access Control Scheme in Cloud-Based Services
    Kai Fan
    Qiong Tian
    Junxiong Wang
    Hui Li
    Yintang Yang
    中国通信, 2017, 14 (01) : 61 - 71
  • [10] Cloud service platform of electronic identity in cyberspace
    Chen, Bing
    Tan, Chengxiang
    Zou, Xiang
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (01): : 413 - 425