Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2018.8.3.079

User privacy protection model through enhancing the administrator role in the cloud environment  

Jeong, Yoon-Su (Department of information Communication Convergence Engineering, Mokwon University)
Yon, Yong-Ho (Department of information Communication Convergence Engineering, Mokwon University)
Publication Information
Journal of Convergence for Information Technology / v.8, no.3, 2018 , pp. 79-84 More about this Journal
Abstract
Cloud services are readily available through a variety of media, attracting a lot of attention from users. However, there are various security damages that abuse the privacy of users who use cloud services, so there is not enough technology to prevent them. In this paper, we propose a protection model to safeguard user's privacy in a cloud environment so as not to illegally exploit user's privacy. The proposed model randomly manages the user's signature to strengthen the role of the middle manager and the cloud server. In the proposed model, the user's privacy information is provided illegally by the cloud server to the user through the security function and the user signature. Also, the signature of the user can be safely used by bundling the random number of the multiplication group and the one-way hash function into the hash chain to protect the user's privacy. As a result of the performance evaluation, the proposed model achieved an average improvement of data processing time of 24.5% compared to the existing model and the efficiency of the proposed model was improved by 13.7% than the existing model because the user's privacy information was group managed.
Keywords
Cloud Service; User Privacy; Security; Hash Chain; Key Management; Property;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. C. Lee & W. Y. Chung. (2014). A robust wearable u-healthcare platform in wireless sensor network. Journal of Communications and Networks, 16, 4, 465-474. DOI : 10.1109/jcn.2014.000077   DOI
2 T. W. Kim, K. H. Park, S. H. Yi & H. C. Kim. (2014). A Big Data Framework for u-Healthcare Systems Utilizing Vital Signs. Proceedings of the 2014 International Symposium on Computer, Consumer and Control(IS3C), 494-497. DOI : 10.1109/is3c.2014.135   DOI
3 F. Touati, R. Tabish & A. Ben Mnaouer. (2014). Towards u-health: An indoor 6LoWPAN based platform for real-time healthcare monitoring. Proceedings of the 2013 6th Joint IFIP Wireless and Mobile Networking Conference(WMNC), 1-4. DOI : 10.1109/wmnc.2013.6548958   DOI
4 Y. S. Lee, N. Bruce, T. Non, E. Alasaarela & H. Lee. (2015). Hybrid Cloud Service Based Healthcare Solutions. Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 25-30. DOI : 10.1109/waina.2015.42   DOI
5 H. Pan. J, J. H. Kim, K. Y. Chun & J. K. Ryu. (2013). Design of Portable Healthcare Gateway for Patient with Chronic Disease. Proceedings of the 2013 International Conference on Information Science and Applications (ICISA), 1-2. DOI : 10.1109/icisa.2013.6579337   DOI
6 H. Hu, Y. Wen, T. S. Chua & X. Li. (2014). Toward Scalable Systems for Big Data Analytics: A Technology Tutorial. IEEE Access, 2, 652-687. DOI : 10.1109/access.2014.2332453   DOI
7 G. L. Prakash, Dr. M. Prateek & Dr. I. Singh. (2014). Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System. International Journal Of Engineering And Computer Science, 3, 4, 5216-5223. DOI : 10.1109/icspct.2014.6884895   DOI
8 S. Nagaraj, Dr. G. S. V. P. Raju & V. Srinadth. (2015). Data Encryption and Authentication Using Public Key Approach. Elsevier Procedia Computer Science, 48, 126-132. DOI : 10.1016/j.procs.2015.04.161   DOI
9 A. K. Dubey, A. K. Dubey, M. Namdev & Shiv Shakti Shrivastava. (2016). Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment. IEEE, 1-8. DOI : 10.1109/CONSEG.2012.6349503.   DOI
10 V. S. Mahalle & A. K. Shahade. (2016). Enhancing the data security in Cloud by implementing Hybrid (Rsa & Aes) Encryption Algorithm. IEEE, 146-149. DOI : 10.1109/INPAC.2014.6981152.   DOI
11 S. Verma & D. Garg. (2015). Improvement in Rebalanced CRT RSA. The International Arab Journal of Information Technology, 12, 6, 524-531.
12 Y. S. Jeong. (2012). RFID-based Authentication Protocol for Implantable Medical Device. The Journal Of Digital Policy & Management, 10, 2, 141-146.
13 Y. S. Jeong & S. H. Lee. (2012). u-Healthcare Service Authentication Protocol based on RFID Technology. The Journal Of Digital Policy & Management, 10, 2, 153-160.
14 Y. S. Jeong & S. H. Lee. (2012). U-Healthcare user's privacy protection protocol with Implantable medical Device of State Information. The Journal of Korea Information and Communications Society(J-KICS), 37, 4, 277-353. DOI : 10.7840/kics.2012.37c.4.297   DOI
15 D. G. Kim & I. G. Song. (2009). Need and Development of u-Healthcare Service. Korean Society for Internet Information, 1, 3, 9-17.