Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2018.8.5.107

User Privacy management model using multiple group factor based on Block chain  

Jeong, Yoon-Su (Department of information Communication Convergence Engineering, Mokwon University)
Kim, Yong-Tae (Department of multimedia, Hannam University)
Park, Gil-Cheol (Department of multimedia, Hannam University)
Publication Information
Journal of Convergence for Information Technology / v.8, no.5, 2018 , pp. 107-113 More about this Journal
Abstract
With the rapid development of big data and Internet technologies among IT technologies, it is being changed into an environment where data stored in the cloud environment can be used wherever the Internet is connected, without storing important data in an external storage device such as USB. However, protection of users' privacy information is becoming increasingly important as the data being processed in the cloud environment is changed into an environment that can be easily handled. In this paper, we propose a user-reserving management model that can improve the user 's service quality without exposing the information used in the cloud environment to a third party. In the proposed model, user group is grouped into virtual environment so that third party can not handle user's privacy information among data processed in various cloud environments, and then identity property and access control policy are processed by block chain.
Keywords
Cloud; User Privacy; Multiple Group; Hash Chain; Property;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Echenauer & V. D. Gligor. (2002, Nov). A Key-Management scheme for Distributed sensor networks. Proceedings of the 9th ACM conference on Computer and communications security. (pp. 41-47).
2 H. Chan, A. Perrig & D. Song. (2003, May). Random key predistribution schemes for Sensor networks. Proceedings of the 2003 IEEE Symposium on Security and Privacy. (pp. 197-213). DOI : 10.1109/secpri.2003.1199337
3 S. Zhu, S. Setia & S. Jajodia. (2002). A distributed group key managemet protocol for ad hoc networks. Unpublished manuscript. George Mason University.
4 A. Khalili, J. Katz & W. A. Arbaugh. (2003, Jan). Toward Secure key Distribution in Truly Ad-Hoc Networks. Proceedings of the 2003 Symposium on Applications and the Internet Workshops(SAINT'03 Workshops). (pp. 342-346). DOI : 10.1109/saintw.2003.1210183
5 S. C. Lee & W. Y. Chung. (2014). A robust wearable u-healthcare platform in wireless sensor network. Journal of Communications and Networks, 16(4), 465-474. DOI : 10.1109/jcn.2014.000077   DOI
6 T. W. Kim, K. H. Park, S. H. Yi & H. C. Kim. (2014, June). A Big Data Framework for u-Healthcare Systems Utilizing Vital Signs. Proceedings of the 2014 International Symposium on Computer, Consumer and Control(IS3C). (pp. 494-497). DOI : 10.1109/is3c.2014.135
7 F. Touati, R. Tabish & A. Ben Mnaouer. (2014, April). Towards u-health: An indoor 6LoWPAN based platform for real-time healthcare monitoring. Proceedings of the 2013 6th Joint IFIP Wireless and Mobile Networking Conference(WMNC). (pp. 1-4).
8 A. Celesti, D. Mulfari, M. Fazio, M. Villari & A. Puliafito. (2016). Exploring container virtualization in iot clouds. Proceedings of the 2016 IEEE International Conference on Smart Computing (SMARTCOMP). (pp. 1-6). DOI : 10.1109/smartcomp.2016.7501691
9 K. S. Dar, A. Taherkordi & F. Eliassen. (2016). Enhancing dependability of cloud-based iot services through virtualization. Proceedings of the 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), 2016. (pp. 106-116). DOI : 10.1109/iotdi.2015.38
10 Y. S. Lee, N. Bruce, T. Non, E. Alasaarela & H. Lee. (2015, March). Hybrid Cloud Service Based Healthcare Solutions. Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA). (pp. 25-30).
11 A. Singh & K. Chatterjee. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115.   DOI
12 A. Iera, G. Morabito & L. Atzori. (2016). The internet of things moves into the cloud. Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW). (pp. 191-191). DOI : 10.1109/ic2ew.2016.54
13 S. Singh, Y. S. Jeong & J. H. Park. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200-222. DOI : 10.1016/j.jnca.2016.09.002   DOI
14 J. Zhang, H. Huang & X. Wang. (2016). Resource provision algorithms in cloud computing: A survey. Journal of Network and Computer Applications, 64, 23-42.   DOI
15 V. Varadharajan & U. Tupakula. (2014). Security as a service model for cloud environment. IEEE Transactions on Network and Service Management, 11(1), 60-75. DOI : 10.1109/tnsm.2014.041614.120394   DOI
16 H. N. Saha, A. Mandal & A. Sinha. (2017). Recent trends in the internet of things. Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC). (pp. 1-4). DOI : 10.1109/ccwc.2017.7868439