2013 International Conference on Information Science and Applications (ICISA) 2013
DOI: 10.1109/icisa.2013.6579424
|View full text |Cite
|
Sign up to set email alerts
|

User-Centric Key Management Scheme for Personal Cloud Storage

Abstract: For the Personal Cloud Storage, security is an important issue. There is latent threat when it comes to the data loss or leakage which may be committed by malicious Cloud Service Provider (CSP) employee. The most basic solution is to encrypt user's data. However, when the encryption key is directly managed by CSP or user's device, then there is latent threat, too. In this paper, we propose the User-Centric Key ManagementScheme. This scheme enables user to store mandatory key fragment and enables only user to u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…This indicates that, although these services should be independent of the PDC of a user, they could be authorized to acquire the user's personal data to enhance their own functions and consequently improve user experiences, although these data are produced by other services [ 17 ]. The third type is the PDC provider oriented privacy; that is, there is latent threat when it comes to the data loss or leakage which may be committed by malicious PDC Providers [ 53 ]. This is a common problem for all cloud services.…”
Section: Personal Data Cloud (Pdc)mentioning
confidence: 99%
See 1 more Smart Citation
“…This indicates that, although these services should be independent of the PDC of a user, they could be authorized to acquire the user's personal data to enhance their own functions and consequently improve user experiences, although these data are produced by other services [ 17 ]. The third type is the PDC provider oriented privacy; that is, there is latent threat when it comes to the data loss or leakage which may be committed by malicious PDC Providers [ 53 ]. This is a common problem for all cloud services.…”
Section: Personal Data Cloud (Pdc)mentioning
confidence: 99%
“…This is a common problem for all cloud services. A basic solution is to encrypt personal data using a user-centric key management scheme [ 53 ], and more advanced security control mechanisms include a trust enhanced secure cloud storage service named TS3 [ 54 ] and SafeShare which encapsulates personal data in self-controlling objects (SCO) and monitors the operations of any other users [ 55 ].…”
Section: Personal Data Cloud (Pdc)mentioning
confidence: 99%
“…SeongMinYoo et al [2] proposed a user-centric key management scheme which enables the user to store the key fragment and enables only user to use the encryption key since optional key fragments are stored in a dispersed manner. There is a problem that encryption key may be leaked by intruder who have acquired the mobile device which is lost by any user.…”
Section: Related Workmentioning
confidence: 99%