Privacy-preserving Wireless Accesses to Cloud Services
نویسنده
چکیده
The advent of smartphones in recent years has changed the wireless landscape. Smartphones have become a platform for online user interface to cloud databases. Cloud databases may provide a large set of userprivate and sensitive data (i.e., objects), while smartphone users (i.e., subjects) provide location-sensitive information. Secure and private services in wireless accessing to cloud databases have been discussed actively for the past recent years. However, the previous techniques are unsatisfactory for dynamism of moving subjects’ wireless accesses. In this paper, we propose a novel technique to dynamically generate virtual private databases (VPD) for each access by taking subjects’ location and time information into account. The contribution of this paper includes a privacy-preserving access control mechanism for dynamism of wireless access.
منابع مشابه
Location- and Time-Dependent VPD for Privacy-Preserving Wireless Accesses to Cloud Services
The advent of smartphones in recent years has changed the wireless landscape. Smartphones have become a platform for online user interface to cloud databases. Cloud databases may provide a large set of user-private and sensitive data (i.e., objects), while smartphone users (i.e., subjects) provide locationsensitive information. Secure and private services in wireless accessing to cloud database...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملAccountability-Preserving Anonymous Delivery of Cloud Services
Cloud computing is an emerging paradigm whose importance both in large and small business is more and more increasing. As one of the reasons motivating the adoption of cloud computing solutions is to alleviate the load of companies related to the solution of security and disaster recovery issues, security is one of the main features to fulfill in a cloud computing system. Moreover, a number of ...
متن کاملState-of-art in Storage Model using Encryption Technique for privacy preserving in Cloud Computing
Now-a-days cloud computing is showing consistent growth in the field of computing. Users can utilize these services on pay-per-use basis. When data is exchanged in cloud, there exists the problem of disclosure of privacy. The idea is to build privacy preserving storage model where data sharing services can update and control the access and limit the usage of their shared data. Preserving privac...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کامل