多云环境下共享数据的安全自毁

Farida Ali Guechi, R. Maamri
{"title":"多云环境下共享数据的安全自毁","authors":"Farida Ali Guechi, R. Maamri","doi":"10.1109/FiCloud.2017.31","DOIUrl":null,"url":null,"abstract":"Due to its flexibility and efficiency, cloud computing becomes a typical infrastructure for storing, processing, and sharing a large amount of Internet of Things (IoT) data collected from devices and sensors. However, data sent to the Cloud may be used incorrectly or copied without permission. To allow owner of data sent to the Cloud to grant access to a specific set of captured data fields for a set of users and prevent that access to others using minimum number of keys; Our approach proposes encryption of data by access. Our solution also allows data owner to restrict access to certain period by destroying data and keys after this time in order to change them; In addition, our approach improves availability, integrity and confidentiality of information stored in the cloud by building a Cloud of Clouds (multi-cloud).","PeriodicalId":115925,"journal":{"name":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Secure Self-Destruction of Shared Data in Multi-CloudIoT\",\"authors\":\"Farida Ali Guechi, R. Maamri\",\"doi\":\"10.1109/FiCloud.2017.31\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to its flexibility and efficiency, cloud computing becomes a typical infrastructure for storing, processing, and sharing a large amount of Internet of Things (IoT) data collected from devices and sensors. However, data sent to the Cloud may be used incorrectly or copied without permission. To allow owner of data sent to the Cloud to grant access to a specific set of captured data fields for a set of users and prevent that access to others using minimum number of keys; Our approach proposes encryption of data by access. Our solution also allows data owner to restrict access to certain period by destroying data and keys after this time in order to change them; In addition, our approach improves availability, integrity and confidentiality of information stored in the cloud by building a Cloud of Clouds (multi-cloud).\",\"PeriodicalId\":115925,\"journal\":{\"name\":\"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)\",\"volume\":\"126 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FiCloud.2017.31\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FiCloud.2017.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

由于其灵活性和高效性,云计算成为存储、处理和共享从设备和传感器收集的大量物联网(IoT)数据的典型基础设施。但是,发送到云的数据可能被错误地使用或未经许可复制。允许发送到云的数据所有者为一组用户授予对一组特定捕获数据字段的访问权限,并使用最少数量的密钥阻止对其他用户的访问;我们的方法建议通过访问对数据进行加密。我们的解决方案还允许数据所有者通过在此时间之后销毁数据和密钥来限制对特定时间段的访问,以便更改它们;此外,我们的方法通过构建云的云(多云)来提高存储在云中的信息的可用性、完整性和机密性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Secure Self-Destruction of Shared Data in Multi-CloudIoT
Due to its flexibility and efficiency, cloud computing becomes a typical infrastructure for storing, processing, and sharing a large amount of Internet of Things (IoT) data collected from devices and sensors. However, data sent to the Cloud may be used incorrectly or copied without permission. To allow owner of data sent to the Cloud to grant access to a specific set of captured data fields for a set of users and prevent that access to others using minimum number of keys; Our approach proposes encryption of data by access. Our solution also allows data owner to restrict access to certain period by destroying data and keys after this time in order to change them; In addition, our approach improves availability, integrity and confidentiality of information stored in the cloud by building a Cloud of Clouds (multi-cloud).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信