Proceedings of the International Conference on Internet of Things and Cloud Computing 2016
DOI: 10.1145/2896387.2896423
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Security Framework for Sensitive Data Sharing and Privacy Preserving on Big-Data and Cloud Platforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…Technical network‐level issue: Cloud computing used unsecured networks like the internet for data communication; due to this insecurity of computer networks, each node can freely alter or internode communication so that to break the whole connection of the system 14,32–34 …”
Section: Literature Reviewmentioning
confidence: 99%
“…Technical network‐level issue: Cloud computing used unsecured networks like the internet for data communication; due to this insecurity of computer networks, each node can freely alter or internode communication so that to break the whole connection of the system 14,32–34 …”
Section: Literature Reviewmentioning
confidence: 99%
“…Again, there is no existing real life dataset corresponding to the information needs of multi-stage tasks of different users. Ideally we should install desktop activity tracking application on thousands of personal desktops, and collect the desktop activity logs of the users of these machines for a period of months and store this data using privacy preserving protocol (Tripathy and Pradhan, 2012;Pise and Uke, 2016). Developing an effective tracking application and deploying it on thousands of desktops would take considerable resource and an enormous amount of infrastructural support.…”
Section: Reference Set Computation For Multi-stage Taskmentioning
confidence: 99%
“…Koe and Lin 29 proposed a proxy reencryption scheme based on offline type, which is convenient to hide the identity of the data owner and data user from the cloud, and to ensure user identity privacy and category privacy through blind decryption. Pise and Uke 30 proposed an efficient security framework for sensitive data sharing and privacy protection on big data and cloud platforms, using a proxy reencryption method to implement virtual machine monitor‐based security and privacy communications makes sensitive information securely shared on big data platforms. Baboolal et al 31 proposed to use proxy reencryption technology to protect the privacy of drone videos, and used a different key to encrypt the encrypted video data a second time to prevent third parties from obtaining the key to access the video accidentally.…”
Section: Related Researchesmentioning
confidence: 99%