Abstract
In order to strengthen users’ confidence to upload the private data to cloud platform, existing ways stressed too much on the security. However, cloud computing was an open and distributed environment, and it should provide highly robust, security and quality service to users. So it was necessary to balance the performance and security in cloud platforms, and one hybrid privacy protection solution was proposed with KP-ABE and CP-ABE. This way chosen different way to encrypt the privacy information based on user attributions according to cloud service business type. Finally, this hybrid solution was verified by the case of campus cloud environment.
This work was supported by Projects of Jiangsu Industry Supporting (BE2010057), Jiangsu High School Natural Science Research (11KJB520013).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Demchenko, Y., Mavrin, A., de Laat, C.: Defining Generic Architecture for Cloud Infrastructure as a Service Provisioning model. In: CLOSER 2011 Conference, Nordwijk, Netherlands, May 7-9 (2011)
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Kon-winski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing, University ofCalifornia, Berkeley, Tech. Rep. UCB-EECS (February 28, 2009)
Gellman, R.: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing. World Privacy Forum (2009)
Mowbray, M., Pearson, S.: A Client-Based Privacy Manager for Cloud Computing. In: COMSWARE 2009, June 16-19 (2009)
Li, H., Dai, Y., Tian, L., Yang, H.: Identity-based authentication for cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 157–166. Springer, Heidelberg (2009)
Gentry, C.: A fully homomorphic encryption scheme. Ph.D. dissertation, Stanford University (2009), http://www.crypto.stanford.edu/craig
Sadeghi, A.-R., Schneider, T., Winandy, M.: Token-based cloud computing. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 417–429. Springer, Heidelberg (2010)
Wroblewski, G.: General method of program code obfuscation, Ph.D. dissertation, Wroclaw University of Technology (2002), http://www.ouah.org/wobfuscation.pdf
Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
Fang, W., Yang, B., Song, D.: Preserving Private Knowledge In Decision Tree Learning. Journal of Computers 5(5), 733–740 (2010)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute Based Encryption for Fine-Grained AccessConrol of Encrypted Data. In: ACM Conference on Computer and Communications Security (ACM CCS) (2006)
Attrapadung, N., Imai, H.: Dual-Policy Attribute Based Encryption. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 168–185. Springer, Heidelberg (2009)
Yubin, G., Liankuan, Z., Fengren, L., Ximing, L.: A Solution for Privacy-Preserving Data Manipulation and Query on NoSQL Database. Journal of Computers 8(6), 1427–1432 (2013)
http://sourceforge.net/p/kpabe/code/1/tree/com/zaranux/crypto/abe/kp/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yi-mu, J. et al. (2014). A Privacy Protection Solution for the Balance of Performance and Security in Cloud Computing. In: Huang, Z., Liu, C., He, J., Huang, G. (eds) Web Information Systems Engineering – WISE 2013 Workshops. WISE 2013. Lecture Notes in Computer Science, vol 8182. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54370-8_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-54370-8_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54369-2
Online ISBN: 978-3-642-54370-8
eBook Packages: Computer ScienceComputer Science (R0)