User-centered Privacy and Trust Model in Cloud Computing Systems

被引:0
|
作者
Dehghantanha, Ali [1 ]
Mahmod, Ramlan [2 ]
Udzir, Nur Izura [1 ]
Zulkarnain, Zoriati Ahmad [1 ]
机构
[1] Univ Putra Malaysia, Fac Comp Sci & Informat Technol, Serdang, Malaysia
[2] MIMOS Berhad Technol Pk Malaysia, Cyber Secur lab, Kuala Lumpur, Malaysia
关键词
Privacy; Trust; Cloud Computing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
the fact that cloud computing systems (formally known as pervasive computing systems) are typically embedded or invisible, making it difficult for users to know when these devices are collecting data. So privacy appears as a major issue for this environment. In this paper we propose a User-centered privacy and trust Model which provides user control over data, identity, location, and time privacy with less than 10% of unobtrusiveness.
引用
收藏
页码:326 / +
页数:3
相关论文
共 50 条
  • [1] UPM: User-centered Privacy Model in Pervasive Computing Systems
    Dehghantanha, Ali
    Mahmod, Ramlan
    INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATIONS, PROCEEDINGS, 2009, : 65 - 70
  • [2] A XML based, User-centered Privacy Model in Pervasive Computing Systems
    Dehghantanha, Ali
    Mahmod, Ramlan
    Udzir, Nur Izura
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (10): : 167 - 173
  • [3] Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems
    Dehghantanha, Ali
    Udzir, Nur Izura
    Mahmod, Ramlan
    COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS, 2011, 6694 : 272 - 284
  • [4] Towards a Model of User-centered Privacy Preservation
    Grace, Paul
    Surridge, Mike
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [5] A User-Centered Model for Usable Security and Privacy
    Feth, Denis
    Maier, Andreas
    Polst, Svenja
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 74 - 89
  • [6] A User-Centered Context-sensitive Privacy Model in Pervasive Systems
    Sagaran, Camarasen A. L.
    Dehghantanha, Ali
    Ramli, Rohaini
    SECOND INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS: ICCSN 2010, PROCEEDINGS, 2010, : 78 - 82
  • [7] Predicting Privacy Settings with a User-centered Approach
    Watson, Jason
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS, 2015, : 499 - 500
  • [8] CloudExplorer: A User-Centered Cloud Browser for Cloud Services
    Li, Yinsheng
    Li, Jiao
    Zhou, Feng
    Fang, Yong
    Chen, Hao
    2012 NINTH IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2012, : 214 - 220
  • [9] A User-Centered Location Model
    Marmasse, Natalia
    Schmandt, Chris
    PERSONAL AND UBIQUITOUS COMPUTING, 2002, 6 (5-6) : 318 - 321
  • [10] A User-Centered Location Model
    Natalia Marmasse
    Chris Schmandt
    Personal and Ubiquitous Computing, 2002, 6 : 318 - 321