One of the major security issues in financial industry is that threats are continuously changing in a dynamic manner and the existing protective schemas may cannot effectively deal with new threats
Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry
HPCC/CSS/ICESS, pp.1332-1337, (2015)
Cyber-security has become one of the most significant issues in the financial industry. New threats continuously emerge when new technologies or approaches are introduced. One security challenge is that financial customers are unaware of the hazards due to the hidden third party. We address this issue and propose a novel approach that is ...更多
下载 PDF 全文
- The financial service industry has been facing various threats since the electronic-based financial services were introduced to the public.
- Data users who have the attributes matching AD can gain the private decryption key.
- The authors' proposed schema mainly uses two types of decryption attributes using different decryption structures, including SDAs and CDAs. a Proactive Secure Schema is an approach that data owners can actively protect their data no matter how external operating environments change.
- The financial service industry has been facing various threats since the electronic-based financial services were introduced to the public
- One of the major security issues in financial industry is that threats are continuously changing in a dynamic manner and the existing protective schemas may cannot effectively deal with new threats
- This paper focuses on this cyber security problem in mobile financial clouds and proposes a novel proactive schema for solving the dynamic emerging threats
- This paper aims to solve this problem and proposes an Proactive Dynamic Secure Data Schema (P2DS), which is a novel approach designed for protecting sensitive financial data in the dynamic communication environment
- We propose an effective schema that initiatively protects mobile users’ privacy information within the dynamic mobile cloud computing environment
- This paper was the first to attempt the initiative approach for protecting data in the dynamic operating cloud-based environment, which was exactly designed for the financial industry
- The method assign other of the parties access private key, which is associated with one or a set of attributes predefined by the data owner.
- R ⊆ ASD, R=SetCDA; Definition III.1 represents the concept of the attribute sets that can gain the decryption authorizations.
- Trusted parties can directly access to the data by the private keys made by SDAs. In the proposed paradigm, trusted parties refer to organizations or individuals known by financial service organizations or mobile financial users.
- Predefined corresponded decryption attribute set An actual input value
- The phrases of Algorithm IV.1 are represented as follows: 1) Input one or multiple actual value for requiring the authorization of generating private key decryption.
- 2) If the gate operator is OR, “∨”, check the correspondence of input value The decryption key and the predefined set is returned if at least oonfeAinSDp.ut matches request.
- 10) The decryption key is returned if all examined values match the attributes the request.
- The core algorithm for P2DS is Algorithm IV.2 that gives the PDEA that is to determine whether the attributes should be encrypted to the data users.
- 1) Input and execute Algorithm IV.1 to see whether the data user is a trusted party on the cloud.
- 2) Execute CDAA algorithm to see whether the data user is a corresponded trusted party on the cloud.
- Fig. 7 exhibits a comparison of private key generation time with using different sets of the attributes between P2DS and CP-ABE.
- Fig. 9 represents the comparison of implementation time for generating CDAA tree with different paths, based on the access tree structure given in Fig. 3.
- CONCLUSIONS This paper proposed a novel schema, P2DS, that aimed to initiative secure sensitive data for mobile clouds in the financial industry.
- This paper was the first to attempt the initiative approach for protecting data in the dynamic operating cloud-based environment, which was exactly designed for the financial industry.
- Table1: Main notations and definitions
- Qiu is supported by NSF CNS-1457506 and NSF CNS-1359557
- F. Hu, M. Qiu, J. Li, T. Grant, D. Taylor, S. McCaleb, L. Butler, and R. Hamner. A review on cloud computing: Design challenges in architecture and security. Journal of Computing and Information Technology, 19(1):25–55, 2011.
- M. Qiu, L. Zhang, and etc. Security-aware optimization for ubiquitous computing systems with SEAT graph approach. J. of Computer and Syst. Sci., 79(5):518–529, 2013.
- K. Gai and S. Li. Towards cloud computing: a literature review on cloud computing and its development trends. In 2012 Fourth Int’l 142–146, Nanjing, China, 2012.
- J. Silver-Greenberg, M. Goldstein, and N. Perlroth. JP-
- 2014. http://dealbook.nytimes.com/2014/10/02/jpmorgan-discoversfurther-cyber-security-issues.
-  M. Snider and K. Whitehouse. Banking hack heist yields up to $1 billion, February 2015.
-  D. Yadron and E. Glazer. New report says computer criminals stole millions from banks, February 2015. http://www.wsj.com/articles/new-report-says-computer-criminalsstole-millions-from-banks-1424033504.
-  M. Qiu and E. Sha. Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems. ACM Trans. on Design Automation of Electronic Syst., 14(2):25, 2009.
-  M. Qiu, J. Niu, L. Yang, X. Qin, S. Zhang, and B. Wang. Energyaware loop parallelism maximization for multi-core DSP architectures. In Proceedings of the 2010 IEEE/ACM Int’l Conf. on Green Social Computing, pages 205–212. IEEE Computer Society, 2010.
-  Z. Wan, J. Liu, and R. Deng. HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. on Info. Forensics and Security, 7(2):743–754, 2012.
-  M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou. Scalable and secure sharing of personal health records in cloud computing using attributebased encryption. IEEE Trans. on Parallel and Distributed Systems, 24(1):131–143, 2013.
-  T. Jung, X. Li, Z. Wan, and M. Wan. Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans. on Info. Forensics and Security, 10(1):190–199, 2015.
-  J. Li, X. Huang, J. Li, X. Chen, and Y. Xiang. Securely outsourcing attribute-based encryption with checkability. IEEE Trans. on Parallel and Distributed Systems, 25(8):2201–2210, 2014.
-  J. Han, W. Susilo, Y. Mu, J. Zhou, and M. Au. Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans. on Info. Forensics and Security, 10(3):665–678, 2015.
-  J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attributebased encryption. In IEEE SP, pages 321–334, 2007.