Grzegorz Spyra
Sticky policies approach within cloud computing
Spyra, Grzegorz; Buchanan, William J.; Ekonomou, Elias
Abstract
This paper discusses a secure document sharing approach, which addresses confidentiality, integrity and authenticity concerns related to cloud-based data sharing. This research is focused on a secure construct that would integrate with other cloud ready standards and products for data protection. Sticky policies recently considered as one of the preferred cloud data protection techniques are here combined with standardized OOXML data package. The defined model leverages the Identity Based Encryption (IBE) scheme to attach sticky policies to the data. This paper also shows several security features and functions that are suitable for secure data sharing in the cloud. Technologies used for proposed construction are not new, therefore only their unique combination with AES key derived from XACML sticky policy via IBE and OOXML wrapper constitutes novelty of this research.
Citation
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2017). Sticky policies approach within cloud computing. Computers and Security, 70, 366-375. https://doi.org/10.1016/j.cose.2017.07.005
Journal Article Type | Article |
---|---|
Acceptance Date | Jul 5, 2017 |
Online Publication Date | Jul 10, 2017 |
Publication Date | 2017-09 |
Deposit Date | Jul 19, 2017 |
Publicly Available Date | Jul 11, 2018 |
Journal | Computers and Security |
Print ISSN | 0167-4048 |
Publisher | Elsevier |
Peer Reviewed | Peer Reviewed |
Volume | 70 |
Pages | 366-375 |
DOI | https://doi.org/10.1016/j.cose.2017.07.005 |
Keywords | IRM, Sticky Policies, IBE, Cloud Security, XACML, Cryptography, |
Public URL | http://researchrepository.napier.ac.uk/Output/963570 |
Contract Date | Jul 19, 2017 |
Files
Sticky policies approach within cloud computing.
(1 Mb)
PDF
Copyright Statement
This article is maintained by: Elsevier; Article Title: Sticky policies approach within cloud computing; Journal Title: Computers & Security; CrossRef DOI link to publisher maintained version: http://dx.doi.org/10.1016/j.cose.2017.07.005; Content Type: article; Copyright: © 2017 Elsevier Ltd. All rights reserved.
You might also like
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
An omnidirectional approach to touch-based continuous authentication
(2023)
Journal Article