Browse > Article
http://dx.doi.org/10.15207/JKCS.2018.9.4.009

User Privacy Security Scheme using Double Replication Key in the Cloud Environment  

Jeong, Yoon-Su (Dept. of information Communication & Convergence Engineering, Mokwon University)
Publication Information
Journal of the Korea Convergence Society / v.9, no.4, 2018 , pp. 9-14 More about this Journal
Abstract
Recently, as the internet speed is getting faster, in the cloud environment, the service receiving device is changing from a general PC to a compact device such as a mobile phone or a tablet PC. Since handheld devices such as mobile phones or tablet PCs are often used in wireless rather than wired, there are many problems that personal information may be exposed maliciously from a third party. In this paper, we propose a user privacy protection scheme through a duplicate duplicate key generation process which can safely protect user 's privacy from third party among cloud services being served through various wireless media. The proposed scheme is used to synchronize the duplicated key between the server and the intermediary device, and aims at shortening the time of the authentication process protecting the user 's privacy. In this case, the proposed scheme uses Interleave() function and random number to synchronize the server and the intermediary device, so it can safely prevent the malicious attack of the third party.
Keywords
Cloud Service; Double Replication Key; User Privacy; Security; Authentication;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 B. Anggorojati, N. R. Prasad & R. Prasad. (2014). Secure capability-based access control in the m2m local cloud platform. Proceedings of the 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace Electronic Systems (VITAE), 1-5.
2 A. Ouaddah, H. Mousannif, A. A. Elkalam & A. A. Ouahman. (2017). Access control in the internet of things: Big challenges and new opportunities. Computer Networks, 112, 237-262.   DOI
3 R. S. Sandhu & P. Samarati. (1994). Access control: Principle and practice. Comm. Mag., 32(9), 40-48.
4 A. Ouaddah, A. A. Elkalam & A. A. Ouahman. (2017). Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT. Cham: Springer International Publishing, 523-533.
5 Y. S. Jeong. (2016). Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare. Journal of Digital Convergence, 11(3), pp. 279-284.   DOI
6 J. G. Choi & B. N. Noh. (2011). Security Technology Research in Cloud Computing Environment. Journal of Security Engineering, 8(3), 371-384.
7 Y. S. Jeong. (2015). An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP. Journal of Digital Convergence, 13(4), 227-233.   DOI
8 Y. S. Jeong. (2016). An Efficient IoT Healthcare Service Management Model of Location Tracking Sensor. Journal of Digital Convergence, 14(3), 261-267.   DOI
9 A. Singh & K. Chatterjee. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115.   DOI
10 S. Singh, Y.-S. Jeong & J. H. Park. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200-222.   DOI
11 H. N. Saha, A. Mandal & A. Sinha. (2017). Recent trends in the internet of things. Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), 1-4.
12 J. Zhang, H. Huang & X. Wang. (2016). Resource provision algorithms in cloud computing: A survey. Journal of Network and Computer Applications, 64, 23-42.   DOI
13 V. Varadharajan & U. Tupakula. (2014). Security as a service model for cloud environment. IEEE Transactions on Network and Service Management, 11(1), 60-75.   DOI
14 A. Iera, G. Morabito & L. Atzori. (2016). The internet of things moves into the cloud. Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), 191-191.
15 A. Celesti, D. Mulfari, M. Fazio, M. Villari & A. Puliafito. (2016). Exploring container virtualization in iot clouds. Proceedings of the 2016 IEEE International Conference on Smart Computing (SMARTCOMP), 1-6.
16 K. S. Dar, A. Taherkordi & F. Eliassen. (2016). Enhancing dependability of cloud-based iot services through virtualization. Proceedings of the 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), 106-116.
17 Y. S. Jeong & S. H. Lee. (2015). Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment. Journal of Digital Convergence, 13(5), 205-211.   DOI