{"title":"Secure Self-Destruction of Shared Data in Multi-CloudIoT","authors":"Farida Ali Guechi, R. Maamri","doi":"10.1109/FiCloud.2017.31","DOIUrl":null,"url":null,"abstract":"Due to its flexibility and efficiency, cloud computing becomes a typical infrastructure for storing, processing, and sharing a large amount of Internet of Things (IoT) data collected from devices and sensors. However, data sent to the Cloud may be used incorrectly or copied without permission. To allow owner of data sent to the Cloud to grant access to a specific set of captured data fields for a set of users and prevent that access to others using minimum number of keys; Our approach proposes encryption of data by access. Our solution also allows data owner to restrict access to certain period by destroying data and keys after this time in order to change them; In addition, our approach improves availability, integrity and confidentiality of information stored in the cloud by building a Cloud of Clouds (multi-cloud).","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FiCloud.2017.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Due to its flexibility and efficiency, cloud computing becomes a typical infrastructure for storing, processing, and sharing a large amount of Internet of Things (IoT) data collected from devices and sensors. However, data sent to the Cloud may be used incorrectly or copied without permission. To allow owner of data sent to the Cloud to grant access to a specific set of captured data fields for a set of users and prevent that access to others using minimum number of keys; Our approach proposes encryption of data by access. Our solution also allows data owner to restrict access to certain period by destroying data and keys after this time in order to change them; In addition, our approach improves availability, integrity and confidentiality of information stored in the cloud by building a Cloud of Clouds (multi-cloud).