Proactive attribute-based secure data schema for mobile cloud in financial industry

  • Keke Gai
  • , Meikang Qiu*
  • , Bhavani Thuraisingham
  • , Lixin Tao
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

94 Citations (Scopus)

Abstract

Cyber-security has become one of the most significant issues in the financial industry. New threats continuously emerge when new technologies or approaches are introduced. One security challenge is that financial customers are unaware of the hazards due to the hidden third party. We address this issue and propose a novel approach that is proactive defense means using attributed-based encryption and data self-deterministic schema to protect financial clients' privacy information. The proposed novel approach is named as Proactive Dynamic Secure Data Schema (P2DS), which is designed to ensure that the sensitive data cannot be directly used by the unanticipated party. Three algorithms have been proposed for P2DS, including Static Decryption Attribute Algorithm (SDAA), Corresponded Decryption Attribute Algorithm (CDAA), and Proactive Determinative Encryption Algorithm (PDEA). The main contributions of this paper are providing an effective method of protecting customers' privacy and reducing operating risks of the financial organizations. Our experiment has proved the validity and efficiency of the proposed schema.

Original languageEnglish
Title of host publicationProceedings - 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security and 2015 IEEE 12th International Conference on Embedded Software and Systems, HPCC-CSS-ICESS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1332-1337
Number of pages6
ISBN (Electronic)9781479989362
DOIs
Publication statusPublished - 23 Nov 2015
Externally publishedYes
Event17th IEEE International Conference on High Performance Computing and Communications, IEEE 7th International Symposium on Cyberspace Safety and Security and IEEE 12th International Conference on Embedded Software and Systems, HPCC-ICESS-CSS 2015 - New York, United States
Duration: 24 Aug 201526 Aug 2015

Publication series

NameProceedings - 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security and 2015 IEEE 12th International Conference on Embedded Software and Systems, HPCC-CSS-ICESS 2015

Conference

Conference17th IEEE International Conference on High Performance Computing and Communications, IEEE 7th International Symposium on Cyberspace Safety and Security and IEEE 12th International Conference on Embedded Software and Systems, HPCC-ICESS-CSS 2015
Country/TerritoryUnited States
CityNew York
Period24/08/1526/08/15

Keywords

  • Cyber security
  • Financial industry
  • Mobile cloud computing
  • Privacy protection
  • Proactive secure schema

Fingerprint

Dive into the research topics of 'Proactive attribute-based secure data schema for mobile cloud in financial industry'. Together they form a unique fingerprint.

Cite this