2021
DOI: 10.1109/access.2021.3067958
|View full text |Cite
|
Sign up to set email alerts
|

A Federated Framework for Fine-Grained Cloud Access Control for Intelligent Big Data Analytic by Service Providers

Abstract: This paper proposes a novel data-owner-driven privacy-aware cloud data acquisition framework for intelligent big data analytics for service providers and users. To realize this idea, we propose three main components. The first one is a new global identity provider concept to support fine-grained access control for a federated outsourcing cloud, namely called P-FIPS (Privacy-enhanced Federated Identity Provider System), in which data owners perform identity access control with the operator of the federated outs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 36 publications
(65 reference statements)
0
4
0
Order By: Relevance
“…rough the construction of the "Internet+" intelligent home care service platform, each disabled home elderly person who participates in the platform does not just become a basic member of the elderly service center, but more meaningful is the huge social support network that is accessed behind this membership network [12,13]. e eight service areas of mobility, medical care, meals, family support, shopping, emergency assistance, and fun and travel assistance allow the disabled elderly to access a rich network of professional resources at home with just a smartphone and a mobile web platform.…”
Section: Support the Multidirectional Extension Of The Networkmentioning
confidence: 99%
“…rough the construction of the "Internet+" intelligent home care service platform, each disabled home elderly person who participates in the platform does not just become a basic member of the elderly service center, but more meaningful is the huge social support network that is accessed behind this membership network [12,13]. e eight service areas of mobility, medical care, meals, family support, shopping, emergency assistance, and fun and travel assistance allow the disabled elderly to access a rich network of professional resources at home with just a smartphone and a mobile web platform.…”
Section: Support the Multidirectional Extension Of The Networkmentioning
confidence: 99%
“…More advanced techniques include continuous monitoring of the behavior of the data handlers, in order to identify malicious or unexpected actions [9,10]. Additional security mitigations solutions adopted anomaly detection techniques to detect model poisoning [43] or advanced access control and storage monitoring [44], although their focus is especially localized and small. Security assurance, on the other hand, enables its users to address privacy and security concerns by actively testing the whole Big Data pipeline environment, its configuration and its behavior, verifying a target set of nonfunctional properties, demonstrating if the applied countermeasures are effective [12].…”
Section: Related Workmentioning
confidence: 99%
“…Its adoption is impeded by some concerns, especially between competitive organizations. Blockchain technology is widely used in recent works to allow access to privacy-enhanced data (Ra et al, 2021;Zhang et al, 2019;Wang et al, 2018;Sabzmakan and Mirtaheri, 2021). Ra et al (2021) proposes a labeled data access system with cloud outsourcing and a keyword search protocol with data linking token.…”
Section: Related Workmentioning
confidence: 99%
“…Blockchain technology is widely used in recent works to allow access to privacy-enhanced data (Ra et al, 2021;Zhang et al, 2019;Wang et al, 2018;Sabzmakan and Mirtaheri, 2021). Ra et al (2021) proposes a labeled data access system with cloud outsourcing and a keyword search protocol with data linking token. Zhang et al (2019;Wang et al, 2018) present a secure scheme against keyword guessing attacks, where users encrypt keywords using a dedicated key server.…”
Section: Related Workmentioning
confidence: 99%