A Service-oriented Identity Authentication Privacy Protection Method in Cloud Computing

نویسندگان

  • Xiaohui Li
  • Jingsha He
  • Ting Zhang
چکیده

Cloud computing provides elastic, scalable on-demand IT services for individuals and organizations. In the cloud computing, everything is as the service. Cloud clients enjoy convenience and efficiency service, but at the same time encounter new issues. Cloud clients needs to provide authentication information to access to service, which often contains a lot of sensitive information. The service provided by Cloud is dynamic, diverse, and context-related. The traditional identity authentication methods which implement coarse-grained to allow or prohibit access is no longer to adapt service-oriented cloud computing. In this paper, we propose a service-oriented identity authentication privacy protection method. In the method, we define cloud service access control as a process and extending the cloud client related information into a fuzzy set as the authentication condition for the exchange, according to the amount of information security level, dynamic opening the corresponding service access control and providing fine-grained service-oriented identity authentication, guarantees global minimal sensitive information disclosure, and maximally protects individual privacy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

RFID-based Electronic Identity Security Cloud Platform in Cyberspace

With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic...

متن کامل

Privacy Aware Authentication Scheme for Distributed Mobile Cloud Computing

As mobile users generally access different types of mobile cloud computing services from a variety of service providers, it is extremely tedious for users to register different user accounts on each service provider and maintain corresponding private keys or passwords for authentication usage. In this paper, I propose a encryption method call Attribute encryption method. Cloud computing is a re...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013