Skip to main content
Top
Published in: Cluster Computing 3/2015

01-09-2015

Ownership-guaranteed security framework for the private data in the entrusted management environment

Authors: SeongMin Yoo, Jinsul Kim, JaeHyung Park, Jiseung Nam, JaeCheol Ryou

Published in: Cluster Computing | Issue 3/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the environment like the Cloud computing or the picture archiving and communications systems (PACS) of the hospital, the user’s data is stored in the storage of a third party. In such entrusted management environment, security is an important issue for the user’s private data. The most basic solution is to encrypt user’s private data. However, if the encryption key is directly managed by cloud service provider (CSP) or PACS service provider (PSP), there is latent threat when it comes to the data loss or leakage which may be committed by malicious insiders. The ownership-guaranteed security framework (OGSF) divides encryption key into a single mandatory fragment and multiple optional fragments while mandating user to store the mandatory fragment in the user’s personal device and mandating CSP or PSP to manage the optional fragments. Because of this division of the management on the encryption key, the OGSF can resolve both threat from the malicious insider and the user’s mistake in same time.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Haley, K., Wood, P.: 2013 Internet security threat report. Symantec Corporation, Mountain View (2013) Haley, K., Wood, P.: 2013 Internet security threat report. Symantec Corporation, Mountain View (2013)
2.
go back to reference Shin, J.S., Yoo, S.M., Kim, S.W., Ryou, J.C., Jang, H.J.: Study on encryption methodology of optimized for digital medical imaging data. J. Next Gener. Info. Technol. 4(8), 530–537 (2013) Shin, J.S., Yoo, S.M., Kim, S.W., Ryou, J.C., Jang, H.J.: Study on encryption methodology of optimized for digital medical imaging data. J. Next Gener. Info. Technol. 4(8), 530–537 (2013)
3.
go back to reference Pianykh, O.S.: Digital imaging and communications in medicine (DICOM): a practical introduction and survival guide. Springer, New York (2011) Pianykh, O.S.: Digital imaging and communications in medicine (DICOM): a practical introduction and survival guide. Springer, New York (2011)
4.
go back to reference U.S. Government. “Guidance regarding methods for de-identification of protected health information in accordance with the health insurance portability and accountability act (HIPAA) privacy rule,” Washington D. C.: U.S. Department of Health and Human Services (2012) U.S. Government. “Guidance regarding methods for de-identification of protected health information in accordance with the health insurance portability and accountability act (HIPAA) privacy rule,” Washington D. C.: U.S. Department of Health and Human Services (2012)
5.
go back to reference Huang, H.K.: PACS and imaging informatics, pp. 219–236. Wiley, Hoboken (2010) Huang, H.K.: PACS and imaging informatics, pp. 219–236. Wiley, Hoboken (2010)
6.
go back to reference Cooke, R.E. Jr, Gaeta, M.G., Kaufman, D.M. and Henrici, G. Picture archiving and communication system, U.S. Patent No. 6,574,629 (June 2003) Cooke, R.E. Jr, Gaeta, M.G., Kaufman, D.M. and Henrici, G. Picture archiving and communication system, U.S. Patent No. 6,574,629 (June 2003)
7.
go back to reference Chen, J., Qian, F., Yan, W., Shen, B.: Translational biomedical informatics in the cloud: present and future. Biomed Res. Int. 2013, 8 (2013) Chen, J., Qian, F., Yan, W., Shen, B.: Translational biomedical informatics in the cloud: present and future. Biomed Res. Int. 2013, 8 (2013)
8.
go back to reference Aupet, J.B., Garcia, E., Guyennet, H., Lapayre, J.C., Martins, D.: Security in medical telediagnosis. Multimed. Serv. Intell. Environ. 3, 201–226 (2010)CrossRef Aupet, J.B., Garcia, E., Guyennet, H., Lapayre, J.C., Martins, D.: Security in medical telediagnosis. Multimed. Serv. Intell. Environ. 3, 201–226 (2010)CrossRef
9.
go back to reference Stantchev, V., Palacios, R.C., Niedermayer, M.: Cloud Computing Based Systems for Healthcare. Sci. World J. 2014, 2 (2014)CrossRef Stantchev, V., Palacios, R.C., Niedermayer, M.: Cloud Computing Based Systems for Healthcare. Sci. World J. 2014, 2 (2014)CrossRef
10.
go back to reference Los, R., Shackleford, D., Sullivan, B.: The notorious nine: cloud computing top threats in 2013, pp. 6–21. Cloud Security Alliance, Nevada (2013) Los, R., Shackleford, D., Sullivan, B.: The notorious nine: cloud computing top threats in 2013, pp. 6–21. Cloud Security Alliance, Nevada (2013)
11.
go back to reference Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef
12.
go back to reference Sun, Y., Zhang, J., Xiong, Y., Zhu, G.: Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw. 2014, 9 (2014) Sun, Y., Zhang, J., Xiong, Y., Zhu, G.: Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw. 2014, 9 (2014)
13.
go back to reference Wang, J., Wang, Z.: A survey on personal data cloud. Sci. World J. 2014, 13 (2014) Wang, J., Wang, Z.: A survey on personal data cloud. Sci. World J. 2014, 13 (2014)
14.
go back to reference Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)CrossRef Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)CrossRef
15.
go back to reference Wang, H., Wu, S., Chen, M., Wang, W.: Security protection between users and the mobile media cloud. IEEE Commun. Mag. 52(3), 73–79 (2014)CrossRef Wang, H., Wu, S., Chen, M., Wang, W.: Security protection between users and the mobile media cloud. IEEE Commun. Mag. 52(3), 73–79 (2014)CrossRef
16.
go back to reference Tian, F., Gui, X., An, J., Yang, P., An, J., Yang, P., Zhao, J., Zhang, X.: Protecting location privacy for outsourced spatial data in cloud storage. Sci. World J. 2014, 11 (2014) Tian, F., Gui, X., An, J., Yang, P., An, J., Yang, P., Zhao, J., Zhang, X.: Protecting location privacy for outsourced spatial data in cloud storage. Sci. World J. 2014, 11 (2014)
17.
go back to reference Kwon, O., Koo, D., Shin, Y., Yoon, H.: A secure and efficient audit mechanism for dynamic shared data in cloud storage. Sci. World J. 2014, 10 (2014) Kwon, O., Koo, D., Shin, Y., Yoon, H.: A secure and efficient audit mechanism for dynamic shared data in cloud storage. Sci. World J. 2014, 10 (2014)
18.
go back to reference Chen, C.Y., Tu, J.F.: A novel cloud computing algorithm of security and privacy. Math. Probl. Eng. 2013, 6 (2013)MathSciNet Chen, C.Y., Tu, J.F.: A novel cloud computing algorithm of security and privacy. Math. Probl. Eng. 2013, 6 (2013)MathSciNet
19.
go back to reference Noh, G., Chun, J.Y.: Sharing privacy protected and statistically sound clinical research data using outsourced data storage. J. Appl. Math. 2014, 12 (2014)MathSciNet Noh, G., Chun, J.Y.: Sharing privacy protected and statistically sound clinical research data using outsourced data storage. J. Appl. Math. 2014, 12 (2014)MathSciNet
20.
go back to reference Haufe, K., Dzombeta, S., Brandis, K.: Proposal for a security management in cloud computing for health care. Sci. World J. 2014, 7 (2014)CrossRef Haufe, K., Dzombeta, S., Brandis, K.: Proposal for a security management in cloud computing for health care. Sci. World J. 2014, 7 (2014)CrossRef
21.
go back to reference Halevi, S., Harnik, D., Pinkas, B., Peleg, A. S. Proofs of ownership in remote storage systems, Proceedings of the 18th ACM conference on Computer and communications security, pp. 491–500 (2011) Halevi, S., Harnik, D., Pinkas, B., Peleg, A. S. Proofs of ownership in remote storage systems, Proceedings of the 18th ACM conference on Computer and communications security, pp. 491–500 (2011)
22.
go back to reference Fatma, E.Z.E., Hikal, N.A., Abou-Chadi, F.E.Z.: Secure medical images sharing over cloud computing environment. Int. J. Adv. Comput. Sci. Appl. 4(5), 130–137 (2013) Fatma, E.Z.E., Hikal, N.A., Abou-Chadi, F.E.Z.: Secure medical images sharing over cloud computing environment. Int. J. Adv. Comput. Sci. Appl. 4(5), 130–137 (2013)
23.
go back to reference Yin, X.C., Thiranant, N., Lee, H.: An efficient and secure data storage scheme using ECC in cloud computing. J. Internet Comput. Serv. 15(2), 49–59 (2014)CrossRef Yin, X.C., Thiranant, N., Lee, H.: An efficient and secure data storage scheme using ECC in cloud computing. J. Internet Comput. Serv. 15(2), 49–59 (2014)CrossRef
24.
go back to reference Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2), 393–399 (2006)CrossRefMATH Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2), 393–399 (2006)CrossRefMATH
25.
go back to reference Seenivasagam, V., Velumani, R.: A QR code based zero watermarking scheme for authentication of medical images in teleradiology cloud. Comput. Math. Methods Med. 2013, 16 (2013)MathSciNetCrossRef Seenivasagam, V., Velumani, R.: A QR code based zero watermarking scheme for authentication of medical images in teleradiology cloud. Comput. Math. Methods Med. 2013, 16 (2013)MathSciNetCrossRef
26.
go back to reference Ko, L.T., Chen, J.E., Shieh, Y.S.: Nested quantization index modulation for reversible watermarking and its application to healthcare information management systems. Comput. Math. Methods Med. 2012, 8 (2012)MathSciNetCrossRef Ko, L.T., Chen, J.E., Shieh, Y.S.: Nested quantization index modulation for reversible watermarking and its application to healthcare information management systems. Comput. Math. Methods Med. 2012, 8 (2012)MathSciNetCrossRef
27.
go back to reference Massoudi, A., Lefebvre, F., Vleeschouwer, C.D., Macq, B., Quisquater, J.J.: Overview on selective encryption of image and video: challenges and perspectives. EURASIP J. Info. Secur. 2008, 18 (2008) Massoudi, A., Lefebvre, F., Vleeschouwer, C.D., Macq, B., Quisquater, J.J.: Overview on selective encryption of image and video: challenges and perspectives. EURASIP J. Info. Secur. 2008, 18 (2008)
29.
go back to reference BLAKLEY, G.R. Safeguarding cryptographic keys, Proceedings of the National Computer Conference, pp. 313–317 (1979) BLAKLEY, G.R. Safeguarding cryptographic keys, Proceedings of the National Computer Conference, pp. 313–317 (1979)
30.
go back to reference Meijering, E.: A chronology of interpolation: from ancient astronomy to modern signal and image processing. Proc. IEEE 90(3), 319–342 (2002)CrossRef Meijering, E.: A chronology of interpolation: from ancient astronomy to modern signal and image processing. Proc. IEEE 90(3), 319–342 (2002)CrossRef
Metadata
Title
Ownership-guaranteed security framework for the private data in the entrusted management environment
Authors
SeongMin Yoo
Jinsul Kim
JaeHyung Park
Jiseung Nam
JaeCheol Ryou
Publication date
01-09-2015
Publisher
Springer US
Published in
Cluster Computing / Issue 3/2015
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-015-0474-4

Other articles of this Issue 3/2015

Cluster Computing 3/2015 Go to the issue

Premium Partner