User-centered Privacy and Trust Model in Cloud Computing Systems

被引:0
作者
Dehghantanha, Ali [1 ]
Mahmod, Ramlan [2 ]
Udzir, Nur Izura [1 ]
Zulkarnain, Zoriati Ahmad [1 ]
机构
[1] Univ Putra Malaysia, Fac Comp Sci & Informat Technol, Serdang, Malaysia
[2] MIMOS Berhad Technol Pk Malaysia, Cyber Secur lab, Kuala Lumpur, Malaysia
来源
ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY | 2010年
关键词
Privacy; Trust; Cloud Computing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
the fact that cloud computing systems (formally known as pervasive computing systems) are typically embedded or invisible, making it difficult for users to know when these devices are collecting data. So privacy appears as a major issue for this environment. In this paper we propose a User-centered privacy and trust Model which provides user control over data, identity, location, and time privacy with less than 10% of unobtrusiveness.
引用
收藏
页码:326 / +
页数:3
相关论文
共 11 条
[1]  
ALMUHTADI J, 2006, PERV COMP COMM WORKS
[2]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[3]  
BERESFORD AR, PERVASIVE COMPUTING, V2, P46
[4]  
BERESFORD AR, 2004, INT WORKSH PERV COMP
[5]  
BHASKAR P, 2007, 2 INT C AV REL SEC A
[6]  
CAMPBELL R, 2002, P INT S SOFTW SEC
[7]   Protection of privacy in pervasive computing environments [J].
Cheng, HS ;
Zhang, DQ ;
Tan, JG .
ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, :242-247
[8]  
LANGHEINRICH M, LECT NOTES COMPUTER, V2498, P72
[9]   Preserving privacy in environments with location based applications [J].
Myles, G ;
Friday, A ;
Davies, N .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :56-64
[10]   Towards a pervasive computing benchmark [J].
Ranganathan, A ;
Al-Muhtadi, J ;
Biehl, J ;
Ziebart, B ;
Campbell, RH ;
Bailey, B .
Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, :194-198