Ziyi Su, Yong Pe, Changda Song, Fuyong Ge, F. Biennier
{"title":"所有者规定的移动云环境中数据访问的数据安全和隐私","authors":"Ziyi Su, Yong Pe, Changda Song, Fuyong Ge, F. Biennier","doi":"10.1109/CIACT.2017.7977318","DOIUrl":null,"url":null,"abstract":"A security principle in the collaborative Mobile Cloud contexts is that data recipients to gain owner's approval for usage and redissemination of digital object shared and merged in transactions/interactions. This paper presents a system for Mobile Cloud scenarios that enabling owner's to stipulate data security and privacy level in the data sharing interactions. During data/information redissemination among Mobile Cloud entities, their security attributes are collected, attested and evaluated upon data owner's security policies, to decide an entity's eligibility for accessing merged data. Implementation and performance experimentation is conducted.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Owner-stipulated data security and privacy for data accessing in Mobile Cloud context\",\"authors\":\"Ziyi Su, Yong Pe, Changda Song, Fuyong Ge, F. Biennier\",\"doi\":\"10.1109/CIACT.2017.7977318\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A security principle in the collaborative Mobile Cloud contexts is that data recipients to gain owner's approval for usage and redissemination of digital object shared and merged in transactions/interactions. This paper presents a system for Mobile Cloud scenarios that enabling owner's to stipulate data security and privacy level in the data sharing interactions. During data/information redissemination among Mobile Cloud entities, their security attributes are collected, attested and evaluated upon data owner's security policies, to decide an entity's eligibility for accessing merged data. Implementation and performance experimentation is conducted.\",\"PeriodicalId\":218079,\"journal\":{\"name\":\"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)\",\"volume\":\"105 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIACT.2017.7977318\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIACT.2017.7977318","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Owner-stipulated data security and privacy for data accessing in Mobile Cloud context
A security principle in the collaborative Mobile Cloud contexts is that data recipients to gain owner's approval for usage and redissemination of digital object shared and merged in transactions/interactions. This paper presents a system for Mobile Cloud scenarios that enabling owner's to stipulate data security and privacy level in the data sharing interactions. During data/information redissemination among Mobile Cloud entities, their security attributes are collected, attested and evaluated upon data owner's security policies, to decide an entity's eligibility for accessing merged data. Implementation and performance experimentation is conducted.