用于在多权威云环境中实施隐私的基于本体的指南

Maherzia Belaazi, H. B. Rahmouni, A. Bouhoula
{"title":"用于在多权威云环境中实施隐私的基于本体的指南","authors":"Maherzia Belaazi, H. B. Rahmouni, A. Bouhoula","doi":"10.1109/CLOUDTECH.2015.7337015","DOIUrl":null,"url":null,"abstract":"Despite its attractive benefits, cloud adoption is challenged by some criteria of security and privacy. Access Control is one of the traditional and essential security tools of data protection. The decision to grant access to a resource must ensure secure management with a specific attention to privacy and data protection regulations. In particular, the challenge is more important with public clouds as many governing authorities could be involved in one cloud scenario. This implies a difficulty to work out which regulation should be applicable in case of conflict. In recent years, many access control models were proposed. Despite increasing legislative pressure, few of these propositions take care of privacy requirements in their security policies specification and enforcement. In this paper, we propose to enforce privacy compliance in access control policies for the context of public cloud. Throughout the use of ontology tools, we propose an approach for checking privacy enforcement with access control conditions. We also suggest the use of privacy safeguards notification where the threat to privacy protection is related to the secondary usage of personal data more than just the data access itself.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An ontology-based guidance for privacy enforcement in a multi-authority cloud environment\",\"authors\":\"Maherzia Belaazi, H. B. Rahmouni, A. Bouhoula\",\"doi\":\"10.1109/CLOUDTECH.2015.7337015\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Despite its attractive benefits, cloud adoption is challenged by some criteria of security and privacy. Access Control is one of the traditional and essential security tools of data protection. The decision to grant access to a resource must ensure secure management with a specific attention to privacy and data protection regulations. In particular, the challenge is more important with public clouds as many governing authorities could be involved in one cloud scenario. This implies a difficulty to work out which regulation should be applicable in case of conflict. In recent years, many access control models were proposed. Despite increasing legislative pressure, few of these propositions take care of privacy requirements in their security policies specification and enforcement. In this paper, we propose to enforce privacy compliance in access control policies for the context of public cloud. Throughout the use of ontology tools, we propose an approach for checking privacy enforcement with access control conditions. We also suggest the use of privacy safeguards notification where the threat to privacy protection is related to the secondary usage of personal data more than just the data access itself.\",\"PeriodicalId\":293168,\"journal\":{\"name\":\"2015 International Conference on Cloud Technologies and Applications (CloudTech)\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-06-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Cloud Technologies and Applications (CloudTech)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CLOUDTECH.2015.7337015\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CLOUDTECH.2015.7337015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

尽管云计算带来了诱人的好处,但它的采用受到了一些安全和隐私标准的挑战。访问控制是数据保护的传统和必不可少的安全工具之一。授予资源访问权限的决定必须确保安全管理,并特别注意隐私和数据保护法规。特别是,公共云的挑战更为重要,因为一个云场景中可能涉及许多管理机构。这意味着很难确定在发生冲突的情况下应适用哪条规定。近年来,提出了许多访问控制模型。尽管立法压力越来越大,但这些提案中很少在其安全策略规范和执行中考虑到隐私要求。在本文中,我们建议在公共云环境下的访问控制策略中强制执行隐私遵从性。在本体工具的使用过程中,我们提出了一种通过访问控制条件检查隐私强制执行的方法。我们还建议使用隐私保障通知,如果对隐私保护的威胁与个人数据的二次使用有关,而不仅仅是数据访问本身。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
An ontology-based guidance for privacy enforcement in a multi-authority cloud environment
Despite its attractive benefits, cloud adoption is challenged by some criteria of security and privacy. Access Control is one of the traditional and essential security tools of data protection. The decision to grant access to a resource must ensure secure management with a specific attention to privacy and data protection regulations. In particular, the challenge is more important with public clouds as many governing authorities could be involved in one cloud scenario. This implies a difficulty to work out which regulation should be applicable in case of conflict. In recent years, many access control models were proposed. Despite increasing legislative pressure, few of these propositions take care of privacy requirements in their security policies specification and enforcement. In this paper, we propose to enforce privacy compliance in access control policies for the context of public cloud. Throughout the use of ontology tools, we propose an approach for checking privacy enforcement with access control conditions. We also suggest the use of privacy safeguards notification where the threat to privacy protection is related to the secondary usage of personal data more than just the data access itself.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Big Data-as-a-service solution for building graph social networks Security challenges in intrusion detection A conceptual framework for personalization of mobile cloud services A multi-criteria analysis of intrusion detection architectures in cloud environments A pareto-based Artificial Bee Colony and product line for optimizing scheduling of VM on cloud computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1