Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A trustworthy access control model for mobile cloud computing based on reputation and mechanism design
Lin H., Xu L., Huang X., Wu W., Huang Y. Ad Hoc Networks35 (C):51-64,2015.Type:Article
Date Reviewed: Jul 7 2016

The applicability of mobile cloud computing has revolutionized the way large amounts of data can be stored and accessed; however, concerns with respect to security and privacy persist. The authors of this paper propose that fine-grained access control may be able to address this concern.

The proposed reputation and mechanism design-based trustworthy access control (RMTAC) model aims to provide secure and privacy-aware big data access control in mobile cloud computing. Existing models are inadequate because they do not account for insider threats. An insider threat is not thwarted by encryption because, by virtue of them being insiders, they have tacit knowledge and are able to crack encryption keys. Also, existing models are not privacy preserving and do not take into account aspects such as information leaks and fine-grained access control.

The authors conducted simulation-based comparative experiments. They verified that RMTAC is secure, privacy preserving, and efficient. The model was found to be more effective than a role-based encryption access control model with respect to internal attacks. This paper provides a unique solution to the generic problem of insider threats, which is notoriously difficult to manage.

Reviewer:  Keshnee Padayachee Review #: CR144554 (1609-0663)
Bookmark and Share
 
Cloud Computing (C.2.4 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Cloud Computing": Date
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (1 of 3)
Dec 14 2009
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (2 of 3)
Jan 26 2010
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (3 of 3)
Mar 18 2010
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy