Cloud computing : preserving data privacy and managing access control

    Research output: Chapter in Book / Conference PaperConference Paperpeer-review

    1 Citation (Scopus)

    Abstract

    ![CDATA[Cloud computing offers many benefits for efficient utilization of computing resources. However, for many potential users and organizations security concerns, and in particular confidentiality of data and access control issues, outweigh such benefits. Some of these concerns relate to traditional network security issues, like confidentiality of data in transit to the cloud server. Some other cases are more relevant to the nature of cloud itself. An example of such a case is when the user desires that data access authorizations remain under their control, without revealing them to the cloud server. In both situations, the challenge is to provide the required solutions with minimal computational and storage overheads. This paper takes up that challenge to provide some solutions that have such characteristics. Our reported solutions are based on the Chines Remainder Theorem and allow for tailored enforcement and updating of access control parameters by the data owner with minimal overheads. In our approach, the data owner can provide each authorized user with the unique symmetric keys, used to encrypt a particular set of data to be shared by them. Furthermore, the security parameters are attached to the data and remain hidden. Consequently, they are not revealed to the cloud provider and unauthorized users at any time.]]
    Original languageEnglish
    Title of host publicationInnovation Vision 2020 : Sustainable Growth, Enterpreneurship, and Economic Development : Proceedings of the 19th International Business Information Management Association Conference, November 12-13, 2012, Barcelona, Spain
    PublisherIBIMA
    Pages1742-1748
    Number of pages7
    ISBN (Print)9780982148983
    Publication statusPublished - 2012
    EventInternational Business Information Management Association Conference -
    Duration: 12 Nov 2013 → …

    Conference

    ConferenceInternational Business Information Management Association Conference
    Period12/11/13 → …

    Keywords

    • access control
    • cloud computing
    • computer security
    • data protection

    Fingerprint

    Dive into the research topics of 'Cloud computing : preserving data privacy and managing access control'. Together they form a unique fingerprint.

    Cite this