Access Control by Signature-Keys to Provide Privacy for Cloud and Big Data

被引:0
|
作者
Jasim, Anwar Chitheer [1 ]
Tapus, Nicolae [1 ]
Hassoon, Imad Ali [1 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat & Comp, Bucharest, Romania
关键词
Big Data; cloud; privacy models; K-anonymity; differential pivacy; authentication; access control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy of data in subjects of cloud computing or big data is one of the most principal issues. The privacy methods studied in previous research showed that privacy infringement for cloud computing or big data happened because multi risks on data by external or internal attackers. An important risk to take into consideration when speaking of the privacy of the stored transactions is represented by the transactions' information which is not in the owner's control. Such a case is represented by the cloud servers that are administered by cloud providers which cannot be wholly trusted by the users with sensitive, private data such as business plans or private information. A simple method for protecting data privacy is by applying certain privacy techniques onto transactions' data, followed by the upload of the modified data into the cloud. In this paper, we are proposing a case study that is built on levels containing three models: cloud's architecture, transaction's manager and clients. Moreover, we consider that our case study is based on the premise of zero trust among the three models, therefore all the transactions take place with third-parties and the data movements are realized going through various levels of security.
引用
收藏
页码:978 / 983
页数:6
相关论文
共 50 条
  • [31] MEDICAL DATA PRIVACY MONITORING BASED ON CLOUD COMPUTING AND ACCESS CONTROL STRATEGY
    Liu, W.
    Tang, C. C.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2016, 118 : 107 - 107
  • [32] Fine-Grained Access Control ensuring Data Privacy in OpenStack Cloud
    John, Naveen Thomas M.
    Thomas, Manoj V.
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES (ICICICT), 2017, : 1669 - 1674
  • [33] Reconsidering big data security and privacy in cloud and mobile cloud systems
    Tawalbeh, Lo'ai A.
    Saldamli, Gokay
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (07) : 810 - 819
  • [34] Achieving Big Data Privacy via Hybrid Cloud
    Huang, Xueli
    Du, Xiaojiang
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 512 - 517
  • [35] Privacy of Clients' Locations in Big Data and Cloud Computing
    Hassoon, Imad Ali
    Tapus, Nicolae
    Jasim, Anwar Chitheer
    2018 IEEE 12TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2018, : 543 - 548
  • [36] Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud
    Yang, Kan
    Jia, Xiaohua
    Ren, Kui
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (12) : 3461 - 3470
  • [37] Enabling Efficient Access Control with Dynamic Policy Updating for Big Data in the Cloud
    Yang, Kan
    Jia, Xiaohua
    Ren, Kui
    Xie, Ruitao
    Huang, Liusheng
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 2013 - 2021
  • [38] Dual Signature based Privacy and Binding of Medical Data on Cloud
    Saqib, Malik Najmus
    Alghamdi, Ahmed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (03): : 783 - 787
  • [39] Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing
    Li, Qi
    Tian, Youliang
    Zhang, Yinghui
    Shen, Limin
    Guo, Jingjing
    IEEE ACCESS, 2019, 7 : 131534 - 131542
  • [40] Cloud Data Security Access with Privacy-Preserving
    Wang, Jingyu
    Gu, Ruichun
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 268 - 271