Cloud: privacy For Locations Based-services' through Access Control with dynamic multi-level policy

被引:0
|
作者
Jasim, Anwar Chitheer [1 ]
Hassoon, Imad Ali [1 ]
Tapus, Nicolae [1 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat & Comp, Bucharest, Romania
来源
2019 6TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT 2019) | 2019年
关键词
D O I
10.1109/codit.2019.8820555
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
LBSs are Location-Based Services that provide certain service based on the current or past user's location. During the past decade, LBSs have become more popular as a result of the widespread use of mobile devices with position functions. Location information is a secondary information that can provide personal insight about one's life. This issue associated with sharing of data in cloud-based locations. For example, a hospital is a public space and the actual location of the hospital does not carry any sensitive information. However, it may become sensitive if the specialty of the hospital is analyzed. In this paper we proposed design presents a combination of methods for providing data privacy protection for location-based services (LBSs) with the use of cloud service. The work built in zero trust and we start to manage the access to the system through different levels. The proposal is based on a model that stores user location data in supplementary servers and not in non-trustable third-party applications. The approach of the present research is to analyze the privacy protection possibilities through data partitioning. The data collected from the different recourses are distributed into different servers according to the partitioning model based on multi-level policy. Access is granted to third party applications only to designated servers and the privacy of the user profile is also ensured in each server, as they are not trustable.
引用
收藏
页码:1911 / 1916
页数:6
相关论文
共 50 条
  • [21] Multi-level access control for collaborative CAD
    Fang, CH
    Peng, W
    Ye, XZ
    Zhang, SY
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2005, : 643 - 648
  • [22] Multi-level Access Control for Geo Contents
    Park, Sun Rae
    Lee, Jong Suk Ruth
    Cho, Kum Won
    Lee, Kyu-Chul
    CONTROL AND AUTOMATION, AND ENERGY SYSTEM ENGINEERING, 2011, 256 : 183 - +
  • [23] Multi-level Policy Engine to Manage Identities and Control Accesses in Cloud Computing Environment
    Moghaddam, Faraz Fatemi
    Cemberci, Suleyman Berk
    Wieder, Philipp
    Yahyapour, Ramin
    SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2018), 2018, 11116 : 120 - 129
  • [24] Packet: a privacy-aware access control policy composition method for services composition in cloud environments
    Li Lin
    Jian Hu
    Jianbiao Zhang
    Frontiers of Computer Science, 2016, 10 : 1142 - 1157
  • [25] Packet:a privacy-aware access control policy composition method for services composition in cloud environments
    Li LIN
    Jian HU
    Jianbiao ZHANG
    Frontiers of Computer Science, 2016, 10 (06) : 1142 - 1157
  • [26] Packet: a privacy-aware access control policy composition method for services composition in cloud environments
    Lin, Li
    Hu, Jian
    Zhang, Jianbiao
    FRONTIERS OF COMPUTER SCIENCE, 2016, 10 (06) : 1142 - 1157
  • [27] Access Control Policy Analysis and Access Denial Method for Cloud Services
    Chi-Lun Liu
    Journal of Electronic Science and Technology, 2013, (02) : 176 - 180
  • [28] Access Control Policy Analysis and Access Denial Method for Cloud Services
    Chi-Lun Liu
    Journal of Electronic Science and Technology, 2013, 11 (02) : 176 - 180
  • [29] Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture
    Dutta, Ratna
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 57 - 71
  • [30] Multi-level spectrum auction through radio access
    Kloeck, Clemens
    Grandblaise, David
    Luo, Jijun
    Dimitrakopoulos, George
    CIRCUITS AND SYSTEMS FOR SIGNAL PROCESSING , INFORMATION AND COMMUNICATION TECHNOLOGIES, AND POWER SOURCES AND SYSTEMS, VOL 1 AND 2, PROCEEDINGS, 2006, : 591 - 594