A Threshold-based Model for Privacy Protection in Cloud Computing

@article{Ren2011ATM,
  title={A Threshold-based Model for Privacy Protection in Cloud Computing},
  author={Xunyi Ren and Linjuan Chen and Junfeng Zhang and Xiaodong Ma},
  journal={International Journal on Advances in Information Sciences and Service Sciences},
  year={2011},
  volume={3},
  pages={163-168}
}
  • Xunyi Ren, Linjuan Chen, Xiaodong Ma
  • Published 30 April 2011
  • Computer Science
  • International Journal on Advances in Information Sciences and Service Sciences
Privacy for cloud computing has become an important issue in recent years. In this paper, we propose a threshold-based model for privacy protection in cloud computing with a particular (n +1, t +1) secret sharing scheme which is bases on the matrix and vector. We show how our (n +1, t +1) secret sharing scheme can be applied to protect privacy. First, we assign each row of the matrix as a key of vector. Next, we make use of the linear correlation and linear independence of the vector to… 
CALIS-based Cloud Library Services Platform Model
TLDR
A CALIS-based cloud service strategy and the corresponding cloud library services platform (i.e. Nebula platform) model is proposed, suitable for constructing large-scale distributed network of public digital library services.
Research on Cloud Manufacturing Multi-granular Resource Access Control based on Capacity Constraint
TLDR
The MGAC conversion method was proved to be more efficient and can adapt the requirement of CM multi-granular resource access control based on unconstrained and capacity constraint.
A Scheduling Algorithm for Private Clouds
TLDR
This paper proposes a hybrid energy-efficient scheduling algorithm using dynamic migration that can not only reduce the response time, conserve more energy, but also achieve higher level of load balancing.
A NEW ALGORITHM OF THE DATA MINING MODEL IN CLOUD COMPUTING BASED ON WEB FUZZY CLUSTERING ANALYSIS
TLDR
The experimental results show that the new algorithm of the data mining model in cloud computing base on web fuzzy clusteri ng analysis can effectively improve the performance of mining.
The Performance Prediction of Cloud Service via JOGM(1,1) Model
TLDR
The simulation results show that the proposed scheme has higher prediction precision compared with classic GM(1,1) model and weighted moving average model, which verifies the effectiveness of the proposed prediction scheme and the feasibility of forecasting the performance of cloud service employing grey system theory.
Analysis of Temperature Field of Concrete Box Girder and Secondary Development of Program
TLDR
Comparative analysis shows that, this type of numerical simulation of temperature field can objectively reflect the actual boundary conditions with high accuracy, and can meet the requirements of practical design and analysis in engineering well.

References

SHOWING 1-10 OF 13 REFERENCES
Information Security of Cloud Computing for Enterprises
TLDR
Experimental platform based on kernel-based virtual machine has established and a dynamic intrusion detection system for strengthening the security application of cloud computing is implemented, and some feasible information security techniques or products are developed.
A Study on Secure Data Storage Strategy in Cloud Computing
TLDR
A secure data storage strategy in cloud computing that splits data d into k sections using the data splitting algorithm, ensures high data security by simplifying k equation solutions, and at the same time, guarantees highly reliable data using the coefficients generated by the splitting algorithm.
Fully homomorphic encryption using ideal lattices
TLDR
This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Difference Secret Sharing Scheme Based on Special Access Right
A secure threshold secret sharing scheme is proposed.This scheme realizes secret sharing among the members having difference access right by structures and solution structures of constant
Proposed NIST standard for role-based access control
TLDR
Although RBAC continues to evolve as users, researchers, and vendors gain experience with its application, the features and components proposed in this standard represent a fundamental and stable set of mechanisms that may be enhanced by developers in further meeting the needs of their customers.
A* Algorithm Based Optimization for Cloud Storage
Cloud Storage provide users with storage space and make user friendly and timely acquire data, which is foundation of all kinds of cloud applications. However, there is lack of deep studies on how to
A Threshold-based Model for Privacy Protection in Cloud Computing Xun-yi Ren, Lin-juan Chen, Jun-feng Zhang, Xiao-dong Ma Advances in Information Sciences and Service Sciences
  • A Threshold-based Model for Privacy Protection in Cloud Computing Xun-yi Ren, Lin-juan Chen, Jun-feng Zhang, Xiao-dong Ma Advances in Information Sciences and Service Sciences
  • 2011
Trust Management of Cloud Security
  • National Symposium on Computer Security
  • 2009
A special (t, n) threshold scheme based on the rank of matrix
  • Journal of Dezhou University
  • 2008
The study of data security management of database service mode
  • Computer Science and Technology
  • 2010
...
...