2010 29th IEEE Symposium on Reliable Distributed Systems 2010
DOI: 10.1109/srds.2010.57
|View full text |Cite
|
Sign up to set email alerts
|

Protection of Identity Information in Cloud Computing without Trusted Third Party

Abstract: Abstract-Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources but also poses risks for data privacy. A single breach can cause significant loss. The heterogeneity of "users" represents a danger of multiple, collaborative threats.In cloud computing, entities may have multiple accounts associated with a single or multiple service providers (SPs). Sharing sensitive identity information (tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 75 publications
(41 citation statements)
references
References 8 publications
0
41
0
Order By: Relevance
“…Experimental evaluations are not reported. 20 To solve third party problem, R. Ranchal et al [69] proposed an approach to protect identity information without including trusted third party and using active bundle scheme. In this approach, Samir's multi party secrete sharing scheme is used to encrypt data.…”
Section: Authentication and Access Control Level Security Issuesmentioning
confidence: 99%
“…Experimental evaluations are not reported. 20 To solve third party problem, R. Ranchal et al [69] proposed an approach to protect identity information without including trusted third party and using active bundle scheme. In this approach, Samir's multi party secrete sharing scheme is used to encrypt data.…”
Section: Authentication and Access Control Level Security Issuesmentioning
confidence: 99%
“…The AB prototype has been implemented using the mobile agent framework Jade (http://jade.tilab.com/) [17,18]. A mobile agent is a software object that contains code and carried data and is able to perform computations on visited hosts, transport itself from one host to another, and interact with and use capabilities of visited hosts [17].…”
Section: Active Bundle Prototype Implementationmentioning
confidence: 99%
“…This brings in all TTP related issues such as loss of control, lack of trust etc [18]. We are investigating approaches to decrease reliance on TTP making ABs more self-protected entities.…”
Section: Resilience Of the Proposed Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…To address these issues cryptographic techniques can be implemented to maintains security for personal information. The advent of cloud computing has permitted us to host the software pack that analyses patient personal information as s/w as a services, [5] PAAS layer controls the execution of the software. In this paper, we propose a novel approach development of cloud model for medical diagnosis expert system in cloud which provides secure patient information through decisions based on lab test reports of the patient and to implement patient access control…”
Section: Introductionmentioning
confidence: 99%