Cloud providers promise a more secure and reliable environment to the users, the integrity of data in the cloud may still be compromised, due to the existence of hardware/ software failures and human errors. An important problem we need to consider is that the re- computation of any signature during user revocation should not affect […]
ANONYMITY BASED ACCURACY-CONSTRAINED PRIVACY-PRESERVING ACCESS CONTROL FRAMEWORK FOR RELATIONAL DATA
In this abstract the focus is on a static relational table that is anonymized only once. To exemplify our approach, role-based access control is assumed. However, the concept of accuracy constraints for permissions can be applied to any privacy-preserving security policy, e.g., discretionary access control. The heuristics proposed in this abstract for accuracy-constrained privacy-preserving access […]
A NOVEL CONSENSUS-BASED RANKING METHOD FOR THE PROBLEM OF TOP-K QUERY ON MULTIVALUED OBJECTS
A novel consensus-based ranking method, named BC ranking, is proposed for the problem of top k query on multivalued objects. The Effective and efficient algorithms are developed to compute the top k query based on BC ranks. The Effective pruning techniques are proposed to significantly improve the performance in terms of CPU and I/O costs. […]
CLOUD COMPUTING WITH RESILIENT UCONABC REEVALUATION AUTHORIZATION MODEL
UCONABC applies continuous authorization reevaluation, which requires usage accounting that enables fine-grained access control for cloud computing. The UCONABC usage control enhances the classical access control by reevaluating continuously the user attributes during consumption of a service or resource against the usage policies. The usage can be understood as an object’s (e.g., a file) read […]
A REVOCABLE MULTI-AUTHORITY CP-ABE SCHEME
In this abstract, we first propose a revocable multi-authority CP-ABE scheme, where an efficient and secure revocation method is proposed to solve the attribute revocation problem in the system. Our attribute revocation method is efficient in the sense that it incurs less communication cost and computation cost, and is secure in the sense t hat […]
LOCAWARD: A SECURE, PRIVACY-PRESERVING, AND REALISTIC MOBILE LOCATION-BASED REWARDING SYSTEM
Location-based social networking, such as Facebook, here users share their locations with friends and find others who are nearby. Another type of MLBSs requires the users to provide current or historical location proof to fulfill some purposes. Emerging as a new type of mobile marketing, mobile location-based services (MLBSs) have attracted intense attention recently. Unfortunately, […]
MULTI-AUTHORITY ACCESS CONTROL SCHEME FOR SECURE CLOUD STORAGE
In multi-authority cloud storage systems, users’ attributes can be changed dynamically. A user may be entitled some new attributes or revoked some current attributes. And his permission of data access should be changed accordingly. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because […]
RESILIENCE TO THE UCONABC CONTINUOUS AUTHORIZATION REEVALUATION FOR CLOUD COMPUTING
The proposed approach provides a resilient UCONABC reevaluation authorization model for cloud computing. The usage architecture for collecting contextual data allows for fine-grained services accounting and authorization attributes. The data are consolidated on a management domain and provided to consumer management systems, enabling the reconfiguration of usage policies and monitoring of SLA fulfillment. The management […]
FEDERATION OF SELFISH CLOUD PROVIDERS USING CAPACITY SHARING STRATEGY
One of the major problems that face the cloud providers (CPs) is the uncertainty in their work-loads; a spike in the requested VMs may result in higher service rejection rates and experienced delays by clients due to congested resources. A straightforward solution to overcome this problem is to over-provision the available resources to be able […]
AUTHORIZED DUPLICATE CHECK SCHEME USING HYBRID CLOUD APPROACH
To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. Deduplication can take place at either the file level or the block level. For file-level deduplication, it eliminates duplicate copies of the same file. Deduplication can also take place at the block […]