Access Control by Signature-Keys to Provide Privacy for Cloud and Big Data

被引:0
|
作者
Jasim, Anwar Chitheer [1 ]
Tapus, Nicolae [1 ]
Hassoon, Imad Ali [1 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat & Comp, Bucharest, Romania
关键词
Big Data; cloud; privacy models; K-anonymity; differential pivacy; authentication; access control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy of data in subjects of cloud computing or big data is one of the most principal issues. The privacy methods studied in previous research showed that privacy infringement for cloud computing or big data happened because multi risks on data by external or internal attackers. An important risk to take into consideration when speaking of the privacy of the stored transactions is represented by the transactions' information which is not in the owner's control. Such a case is represented by the cloud servers that are administered by cloud providers which cannot be wholly trusted by the users with sensitive, private data such as business plans or private information. A simple method for protecting data privacy is by applying certain privacy techniques onto transactions' data, followed by the upload of the modified data into the cloud. In this paper, we are proposing a case study that is built on levels containing three models: cloud's architecture, transaction's manager and clients. Moreover, we consider that our case study is based on the premise of zero trust among the three models, therefore all the transactions take place with third-parties and the data movements are realized going through various levels of security.
引用
收藏
页码:978 / 983
页数:6
相关论文
共 50 条
  • [41] Formal Verification of Mandatory access control for Privacy Cloud
    Zhu, Yi
    Zhu, Hong
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 297 - 300
  • [42] Privacy Preserving and Delegated Access Control for Cloud Applications
    Xinfeng Ye
    TsinghuaScienceandTechnology, 2016, 21 (01) : 40 - 54
  • [43] Privacy-Preserved Access Control for Cloud Computing
    Zhou, Miao
    Mu, Yi
    Susilo, Willy
    Au, Man Ho
    Yan, Jun
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 83 - 90
  • [44] Privacy-Preserving Access Control in Cloud Federations
    Alansari, Shorouq
    Paci, Federica
    Margheri, Andrea
    Sassone, Vladimiro
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 757 - 760
  • [45] Privacy Preserving and Delegated Access Control for Cloud Applications
    Ye, Xinfeng
    TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (01) : 40 - 54
  • [46] Privacy Protected Preservation of Electric Vehicles' Data in Cloud Computing Using Secure Data Access Control
    Alattab, Ahmed Abdu
    Irshad, Reyazur Rashid
    Yahya, Anwar Ali
    Al-Awady, Amin A.
    ENERGIES, 2022, 15 (21)
  • [47] Privacy-Preserving Deep Learning on Big Data in Cloud
    Fan, Yongkai
    Zhang, Wanyu
    Bai, Jianrong
    Lei, Xia
    Li, Kuanching
    CHINA COMMUNICATIONS, 2023, 20 (11) : 176 - 186
  • [48] Privacy Protection Method in the Era of Cloud Computing and Big Data
    Liu, Ying
    INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND APPLICATION (ICETA 2015), 2015, 22
  • [49] Privacy-enhancing Cloud Computing Solution for Big Data
    Smekal, David
    Ricci, Sara
    Dzurenda, Petr
    Martinasek, Zdenek
    2019 11TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2019,
  • [50] Risk Assessment for Big Data in Cloud: Security, Privacy and Trust
    Ali, Hazirah Bee Bt Yusof
    Abdullah, Lili Marziana Bt
    Kartiwi, Mira
    Nordin, Azlin
    PROCEEDINGS OF 2018 ARTIFICIAL INTELLIGENCE AND CLOUD COMPUTING CONFERENCE (AICCC 2018), 2018, : 63 - 67