2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal Aspects of Data pRivacy and SEcurity 2015
DOI: 10.1109/telerise.2015.15
|View full text |Cite
|
Sign up to set email alerts
|

Personal Cloudlets: Implementing a User-centric Datastore with Privacy Aware Access Control for Cloud-Based Data Platforms

Abstract: This paper presents OPENi's Personal Cloudlets framework as a novel approach to enhancing users control and privacy over their data on a data driven, cloud-based platform.We introduce the EU FP7 funded project OPENi, the OPENi concept, and the research objectives that influenced the design and implementation of OPENi's Personal Cloudlet Framework. We outline OPENi's architecture and describe how through the use of REST based endpoints, object-based access control, OPENi Types, and stateless JSON Web Token (JWT… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…Finally, note that certain edge paradigms allow users to deploy their own personal data centers. Consequently, some works, such as the OPENi framework [85], have studied how to grant access to external users in such personal cloudlet platforms. In OPENi, the authentication component makes use of the OpenID Connect authentication layer, amongst other mechanisms.…”
Section: Identity and Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, note that certain edge paradigms allow users to deploy their own personal data centers. Consequently, some works, such as the OPENi framework [85], have studied how to grant access to external users in such personal cloudlet platforms. In OPENi, the authentication component makes use of the OpenID Connect authentication layer, amongst other mechanisms.…”
Section: Identity and Authenticationmentioning
confidence: 99%
“…There are very few studies that have investigated the development of fine-grained access control mechanisms in the context of edge paradigms. One example is the OPENi framework [85], which was mentioned in the previous section. In this framework, the authorization is based on OAuth 2.0, and the owner of the cloudlet defines the access rights of every resource by creating and storing access control lists (ACL) in a NoSQL database.…”
Section: Access Control Systemsmentioning
confidence: 99%
“…Attacks' consequences could be similar to traditional cyber-attacks; however, new attacks with serious impacts might be orchestrated, such as injection of manipulated information during a collaboration session, the deployment of disguised services and searching for victims with specific vulnerabilities. Multiple security facets have been discussed, including identity and authentication (Toosi et al, 2014;Touceda et al, 2015), access control systems (McCarthy et al, 2015;Huang et al, 2014;Vassilakis et al, 2016;Dsouza et al, 2014), protocol and network security (Kreutz et al, 2015;Li and Chen, 2015;Chen et al, 2016), intrusion detection systems (Mtibaa et al, 2015;Gai et al, 2016;Shi et al, 2015) and privacy (Ravichandran et al, 2015;Zhang et al, 2015;Huang et al, 2016). This paper focuses on trust, however, these topics have been briefly referred-to when necessary.…”
Section: Security Threatsmentioning
confidence: 99%
“…Another study describes a secure access control system that uses an intermediate layer between the mobile device and the cloud to control access; the intermediate layer is composed of cloudlets deployed by the cloud provider [ 7 ]. Additionally, a third system describes a framework for personal cloudlets that uses access control that is sensitive to user privacy [ 24 ]. Other approaches use proxy signatures as an access control protocol [ 25 ].…”
Section: Related Workmentioning
confidence: 99%