AI帮你理解科学

AI 生成解读视频

AI抽取解析论文重点内容自动生成视频


pub
生成解读视频

AI 溯源

AI解析本论文相关学术脉络


Master Reading Tree
生成 溯源树

AI 精读

AI抽取本论文的概要总结


微博一下
One of the major security issues in financial industry is that threats are continuously changing in a dynamic manner and the existing protective schemas may cannot effectively deal with new threats

Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry

HPCC/CSS/ICESS, pp.1332-1337, (2015)

被引用56|浏览31
EI
下载 PDF 全文
引用
微博一下

摘要

Cyber-security has become one of the most significant issues in the financial industry. New threats continuously emerge when new technologies or approaches are introduced. One security challenge is that financial customers are unaware of the hazards due to the hidden third party. We address this issue and propose a novel approach that is ...更多

代码

数据

0
简介
  • The financial service industry has been facing various threats since the electronic-based financial services were introduced to the public.
  • Data users who have the attributes matching AD can gain the private decryption key.
  • The authors' proposed schema mainly uses two types of decryption attributes using different decryption structures, including SDAs and CDAs. a Proactive Secure Schema is an approach that data owners can actively protect their data no matter how external operating environments change.
重点内容
  • The financial service industry has been facing various threats since the electronic-based financial services were introduced to the public
  • One of the major security issues in financial industry is that threats are continuously changing in a dynamic manner and the existing protective schemas may cannot effectively deal with new threats
  • This paper focuses on this cyber security problem in mobile financial clouds and proposes a novel proactive schema for solving the dynamic emerging threats
  • This paper aims to solve this problem and proposes an Proactive Dynamic Secure Data Schema (P2DS), which is a novel approach designed for protecting sensitive financial data in the dynamic communication environment
  • We propose an effective schema that initiatively protects mobile users’ privacy information within the dynamic mobile cloud computing environment
  • This paper was the first to attempt the initiative approach for protecting data in the dynamic operating cloud-based environment, which was exactly designed for the financial industry
结果
  • The method assign other of the parties access private key, which is associated with one or a set of attributes predefined by the data owner.
  • R ⊆ ASD, R=SetCDA; Definition III.1 represents the concept of the attribute sets that can gain the decryption authorizations.
  • Trusted parties can directly access to the data by the private keys made by SDAs. In the proposed paradigm, trusted parties refer to organizations or individuals known by financial service organizations or mobile financial users.
  • Predefined corresponded decryption attribute set An actual input value
  • The phrases of Algorithm IV.1 are represented as follows: 1) Input one or multiple actual value for requiring the authorization of generating private key decryption.
  • 2) If the gate operator is OR, “∨”, check the correspondence of input value The decryption key and the predefined set is returned if at least oonfeAinSDp.ut matches request.
  • 10) The decryption key is returned if all examined values match the attributes the request.
  • The core algorithm for P2DS is Algorithm IV.2 that gives the PDEA that is to determine whether the attributes should be encrypted to the data users.
  • 1) Input and execute Algorithm IV.1 to see whether the data user is a trusted party on the cloud.
  • 2) Execute CDAA algorithm to see whether the data user is a corresponded trusted party on the cloud.
  • Fig. 7 exhibits a comparison of private key generation time with using different sets of the attributes between P2DS and CP-ABE.
结论
  • Fig. 9 represents the comparison of implementation time for generating CDAA tree with different paths, based on the access tree structure given in Fig. 3.
  • CONCLUSIONS This paper proposed a novel schema, P2DS, that aimed to initiative secure sensitive data for mobile clouds in the financial industry.
  • This paper was the first to attempt the initiative approach for protecting data in the dynamic operating cloud-based environment, which was exactly designed for the financial industry.
表格
  • Table1: Main notations and definitions
Download tables as Excel
基金
  • Qiu is supported by NSF CNS-1457506 and NSF CNS-1359557
引用论文
  • F. Hu, M. Qiu, J. Li, T. Grant, D. Taylor, S. McCaleb, L. Butler, and R. Hamner. A review on cloud computing: Design challenges in architecture and security. Journal of Computing and Information Technology, 19(1):25–55, 2011.
    Google ScholarLocate open access versionFindings
  • M. Qiu, L. Zhang, and etc. Security-aware optimization for ubiquitous computing systems with SEAT graph approach. J. of Computer and Syst. Sci., 79(5):518–529, 2013.
    Google ScholarLocate open access versionFindings
  • K. Gai and S. Li. Towards cloud computing: a literature review on cloud computing and its development trends. In 2012 Fourth Int’l 142–146, Nanjing, China, 2012.
    Google ScholarLocate open access versionFindings
  • J. Silver-Greenberg, M. Goldstein, and N. Perlroth. JP-
    Google ScholarLocate open access versionFindings
  • 2014. http://dealbook.nytimes.com/2014/10/02/jpmorgan-discoversfurther-cyber-security-issues.
    Findings
  • [5] M. Snider and K. Whitehouse. Banking hack heist yields up to $1 billion, February 2015.
    Google ScholarFindings
  • http://www.usatoday.com/story/tech/2015/02/15/hackers-stealbillion-in-banking-breach/23464913/.
    Findings
  • [6] D. Yadron and E. Glazer. New report says computer criminals stole millions from banks, February 2015. http://www.wsj.com/articles/new-report-says-computer-criminalsstole-millions-from-banks-1424033504.
    Findings
  • [7] M. Qiu and E. Sha. Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems. ACM Trans. on Design Automation of Electronic Syst., 14(2):25, 2009.
    Google ScholarLocate open access versionFindings
  • [8] M. Qiu, J. Niu, L. Yang, X. Qin, S. Zhang, and B. Wang. Energyaware loop parallelism maximization for multi-core DSP architectures. In Proceedings of the 2010 IEEE/ACM Int’l Conf. on Green Social Computing, pages 205–212. IEEE Computer Society, 2010.
    Google ScholarLocate open access versionFindings
  • [9] Z. Wan, J. Liu, and R. Deng. HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. on Info. Forensics and Security, 7(2):743–754, 2012.
    Google ScholarLocate open access versionFindings
  • [10] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou. Scalable and secure sharing of personal health records in cloud computing using attributebased encryption. IEEE Trans. on Parallel and Distributed Systems, 24(1):131–143, 2013.
    Google ScholarLocate open access versionFindings
  • [11] T. Jung, X. Li, Z. Wan, and M. Wan. Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans. on Info. Forensics and Security, 10(1):190–199, 2015.
    Google ScholarLocate open access versionFindings
  • [12] J. Li, X. Huang, J. Li, X. Chen, and Y. Xiang. Securely outsourcing attribute-based encryption with checkability. IEEE Trans. on Parallel and Distributed Systems, 25(8):2201–2210, 2014.
    Google ScholarLocate open access versionFindings
  • [13] J. Han, W. Susilo, Y. Mu, J. Zhou, and M. Au. Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans. on Info. Forensics and Security, 10(3):665–678, 2015.
    Google ScholarLocate open access versionFindings
  • [15] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attributebased encryption. In IEEE SP, pages 321–334, 2007.
    Google ScholarLocate open access versionFindings
您的评分 :
0

 

标签
评论
数据免责声明
页面数据均来自互联网公开来源、合作出版商和通过AI技术自动分析结果,我们不对页面数据的有效性、准确性、正确性、可靠性、完整性和及时性做出任何承诺和保证。若有疑问,可以通过电子邮件方式联系我们:report@aminer.cn
小科