Access Control by Signature-Keys to Provide Privacy for Cloud and Big Data

被引:0
|
作者
Jasim, Anwar Chitheer [1 ]
Tapus, Nicolae [1 ]
Hassoon, Imad Ali [1 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat & Comp, Bucharest, Romania
关键词
Big Data; cloud; privacy models; K-anonymity; differential pivacy; authentication; access control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy of data in subjects of cloud computing or big data is one of the most principal issues. The privacy methods studied in previous research showed that privacy infringement for cloud computing or big data happened because multi risks on data by external or internal attackers. An important risk to take into consideration when speaking of the privacy of the stored transactions is represented by the transactions' information which is not in the owner's control. Such a case is represented by the cloud servers that are administered by cloud providers which cannot be wholly trusted by the users with sensitive, private data such as business plans or private information. A simple method for protecting data privacy is by applying certain privacy techniques onto transactions' data, followed by the upload of the modified data into the cloud. In this paper, we are proposing a case study that is built on levels containing three models: cloud's architecture, transaction's manager and clients. Moreover, we consider that our case study is based on the premise of zero trust among the three models, therefore all the transactions take place with third-parties and the data movements are realized going through various levels of security.
引用
收藏
页码:978 / 983
页数:6
相关论文
共 50 条
  • [21] A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud
    Premkamal, Praveen Kumar
    Pasupuleti, Syam Kumar
    Alphonse, P. J. A.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (07) : 2693 - 2707
  • [22] A privacy protection model for health care big data based on trust evaluation access control in cloud service environment
    Hu, Xiaohan
    Jiang, Rong
    Shi, Mingyue
    Shang, Jingwei
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (03) : 3167 - 3178
  • [23] Access Control on Big Data and Small Pixels: How to Achieve Privacy and Security
    Baumann, Peter
    Misev, Dimitar
    2019 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS 2019), 2019, : 5671 - 5674
  • [24] Combination of Access Control and De-Identification for Privacy Preserving in Big Data
    Rahmani, Amine
    Amine, Abdelmalek
    Hamou, Reda Mohamed
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (01) : 1 - 27
  • [25] Toward Efficient Data Access Privacy in the Cloud
    Sanchez-Artigas, Marc
    IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (11) : 39 - 45
  • [26] Access control based privacy preserving secure data sharing with hidden access policies in cloud
    Sabitha, S.
    Rajasree, M. S.
    JOURNAL OF SYSTEMS ARCHITECTURE, 2017, 75 : 50 - 58
  • [27] New Hidden Policy CP-ABE for Big Data Access Control with Privacy-preserving Policy in Cloud Computing
    Khuntia, Sucharita
    Kumar, P. Syam
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [28] An efficient privacy preserving search scheme with access control for cloud data centers
    George, Tresa Mary, V
    Shamna, S.
    Kizhakkethottam, Jubilant J.
    1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016, 2016, 25 : 310 - 317
  • [29] Enabling Privacy-Preserving Data Sharing with Bilateral Access Control for Cloud
    Wu, Tong
    Ma, Xiaochen
    Yan, Hailun
    ELECTRONICS, 2023, 12 (23)
  • [30] Revocable and Privacy-Preserving Bilateral Access Control for Cloud Data Sharing
    Zhao, Mingyang
    Zhang, Chuan
    Wu, Tong
    Ni, Jianbing
    Liu, Ximeng
    Zhu, Liehuang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5389 - 5404