DOI QR코드

DOI QR Code

User privacy protection model through enhancing the administrator role in the cloud environment

클라우드 환경에서 관리자 역할을 강화한 사용자 프라이버시 보호 모델

  • Jeong, Yoon-Su (Department of information Communication Convergence Engineering, Mokwon University) ;
  • Yon, Yong-Ho (Department of information Communication Convergence Engineering, Mokwon University)
  • 정윤수 (목원대학교 정보통신융합공학부) ;
  • 연용호 (목원대학교 정보통신융합공학부)
  • Received : 2018.05.14
  • Accepted : 2018.06.20
  • Published : 2018.06.30

Abstract

Cloud services are readily available through a variety of media, attracting a lot of attention from users. However, there are various security damages that abuse the privacy of users who use cloud services, so there is not enough technology to prevent them. In this paper, we propose a protection model to safeguard user's privacy in a cloud environment so as not to illegally exploit user's privacy. The proposed model randomly manages the user's signature to strengthen the role of the middle manager and the cloud server. In the proposed model, the user's privacy information is provided illegally by the cloud server to the user through the security function and the user signature. Also, the signature of the user can be safely used by bundling the random number of the multiplication group and the one-way hash function into the hash chain to protect the user's privacy. As a result of the performance evaluation, the proposed model achieved an average improvement of data processing time of 24.5% compared to the existing model and the efficiency of the proposed model was improved by 13.7% than the existing model because the user's privacy information was group managed.

클라우드 서비스는 다양한 매체를 통해 손쉽게 사용할 수 있어 많은 사용자로부터 많은 각광을 받고 있다. 그러나, 클라우드 서비스를 사용하는 사용자의 프라이버시를 악용하는 다양한 보안 피해가 증가하고 있어 이를 예방할 수 있는 기술들이 부족한 상황이다. 본 논문에서는 클라우드 환경에서 사용자의 프라이버시를 제3자가 불법적으로 악용하지 않도록 사용자의 프라이버시를 안전하게 보호하기 위한 보호 모델을 제안한다. 제안 모델은 중간 관리자와 클라우드 서버의 역할을 강화하기 위해서 사용자의 서명을 랜덤하게 분할 관리하고 있다. 제안 모델에서 사용자의 프라이버시 정보는 보안함수와 사용자 서명을 통해 클라우드 서버가 사용자에게 제공하고 있기 때문에 제3자에게 불법적으로 유출되는 것을 막고 있다. 또한, 사용자의 프라이버시 보호에 곱셈군의 랜덤수와 일방행 해쉬 함수를 해쉬체인으로 묶음으로써 사용자의 서명을 안전하게 사용할 수 있다. 성능평가 결과, 제안 모델은 기존 모델보다 데이터의 처리시간이 평균 24.5% 향상된 결과를 얻었고, 사용자의 프라이버시 정보를 그룹 관리하기 때문에 기존 모델보다 효율성이 13.7% 향상되었다.

Keywords

References

  1. S. C. Lee & W. Y. Chung. (2014). A robust wearable u-healthcare platform in wireless sensor network. Journal of Communications and Networks, 16, 4, 465-474. DOI : 10.1109/jcn.2014.000077
  2. T. W. Kim, K. H. Park, S. H. Yi & H. C. Kim. (2014). A Big Data Framework for u-Healthcare Systems Utilizing Vital Signs. Proceedings of the 2014 International Symposium on Computer, Consumer and Control(IS3C), 494-497. DOI : 10.1109/is3c.2014.135
  3. F. Touati, R. Tabish & A. Ben Mnaouer. (2014). Towards u-health: An indoor 6LoWPAN based platform for real-time healthcare monitoring. Proceedings of the 2013 6th Joint IFIP Wireless and Mobile Networking Conference(WMNC), 1-4. DOI : 10.1109/wmnc.2013.6548958
  4. Y. S. Lee, N. Bruce, T. Non, E. Alasaarela & H. Lee. (2015). Hybrid Cloud Service Based Healthcare Solutions. Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 25-30. DOI : 10.1109/waina.2015.42
  5. H. Pan. J, J. H. Kim, K. Y. Chun & J. K. Ryu. (2013). Design of Portable Healthcare Gateway for Patient with Chronic Disease. Proceedings of the 2013 International Conference on Information Science and Applications (ICISA), 1-2. DOI : 10.1109/icisa.2013.6579337
  6. H. Hu, Y. Wen, T. S. Chua & X. Li. (2014). Toward Scalable Systems for Big Data Analytics: A Technology Tutorial. IEEE Access, 2, 652-687. DOI : 10.1109/access.2014.2332453
  7. S. Nagaraj, Dr. G. S. V. P. Raju & V. Srinadth. (2015). Data Encryption and Authentication Using Public Key Approach. Elsevier Procedia Computer Science, 48, 126-132. DOI : 10.1016/j.procs.2015.04.161
  8. A. K. Dubey, A. K. Dubey, M. Namdev & Shiv Shakti Shrivastava. (2016). Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment. IEEE, 1-8. DOI : 10.1109/CONSEG.2012.6349503.
  9. V. S. Mahalle & A. K. Shahade. (2016). Enhancing the data security in Cloud by implementing Hybrid (Rsa & Aes) Encryption Algorithm. IEEE, 146-149. DOI : 10.1109/INPAC.2014.6981152.
  10. G. L. Prakash, Dr. M. Prateek & Dr. I. Singh. (2014). Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System. International Journal Of Engineering And Computer Science, 3, 4, 5216-5223. DOI : 10.1109/icspct.2014.6884895
  11. S. Verma & D. Garg. (2015). Improvement in Rebalanced CRT RSA. The International Arab Journal of Information Technology, 12, 6, 524-531.
  12. Y. S. Jeong. (2012). RFID-based Authentication Protocol for Implantable Medical Device. The Journal Of Digital Policy & Management, 10, 2, 141-146.
  13. Y. S. Jeong & S. H. Lee. (2012). u-Healthcare Service Authentication Protocol based on RFID Technology. The Journal Of Digital Policy & Management, 10, 2, 153-160.
  14. Y. S. Jeong & S. H. Lee. (2012). U-Healthcare user's privacy protection protocol with Implantable medical Device of State Information. The Journal of Korea Information and Communications Society(J-KICS), 37, 4, 277-353. DOI : 10.7840/kics.2012.37c.4.297
  15. D. G. Kim & I. G. Song. (2009). Need and Development of u-Healthcare Service. Korean Society for Internet Information, 1, 3, 9-17.