An explication of secret sharing schemes
Designs, Codes and Cryptography
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Web Privacy with P3p
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Information Systems Frontiers
Securing Information Transfer in Distributed Computing Environments
IEEE Security and Privacy
Selected Areas in Cryptography
Simplified privacy controls for aggregated services: suspend and resume of personal data
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Data usage control in the future internet cloud
The future internet
Toward Accountability in the Cloud
IEEE Internet Computing
Interactive conditional proxy re-encryption with fine grain policy
Journal of Systems and Software
PPL: PrimeLife Privacy Policy Engine
POLICY '11 Proceedings of the 2011 IEEE International Symposium on Policies for Distributed Systems and Networks
Enhancing user privacy through data handling policies
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
End-to-End Policy-Based Encryption and Management of Data in the Cloud
CLOUDCOM '11 Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
IEEE Transactions on Information Theory
Accountability for cloud and other future Internet services
CLOUDCOM '12 Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)
Hi-index | 0.00 |
We describe a data management solution and associated key management approaches to provide accountability within service provision networks, in particular addressing privacy issues in cloud computing applications. Our solution involves machine readable policies that stick to data to define allowed usage and obligations as data travels across multiple parties. Service providers have fine-grained access to specific data based on agreed policies, enforced by interactions with independent third parties that check for policy compliance before releasing decryption keys required for data access. We describe alternative solutions based upon Public Key Infrastructure (PKI), Identity Based Encryption (IBE) and advanced secret sharing schemes.