TY - GEN
T1 - Proactive attribute-based secure data schema for mobile cloud in financial industry
AU - Gai, Keke
AU - Qiu, Meikang
AU - Thuraisingham, Bhavani
AU - Tao, Lixin
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/11/23
Y1 - 2015/11/23
N2 - Cyber-security has become one of the most significant issues in the financial industry. New threats continuously emerge when new technologies or approaches are introduced. One security challenge is that financial customers are unaware of the hazards due to the hidden third party. We address this issue and propose a novel approach that is proactive defense means using attributed-based encryption and data self-deterministic schema to protect financial clients' privacy information. The proposed novel approach is named as Proactive Dynamic Secure Data Schema (P2DS), which is designed to ensure that the sensitive data cannot be directly used by the unanticipated party. Three algorithms have been proposed for P2DS, including Static Decryption Attribute Algorithm (SDAA), Corresponded Decryption Attribute Algorithm (CDAA), and Proactive Determinative Encryption Algorithm (PDEA). The main contributions of this paper are providing an effective method of protecting customers' privacy and reducing operating risks of the financial organizations. Our experiment has proved the validity and efficiency of the proposed schema.
AB - Cyber-security has become one of the most significant issues in the financial industry. New threats continuously emerge when new technologies or approaches are introduced. One security challenge is that financial customers are unaware of the hazards due to the hidden third party. We address this issue and propose a novel approach that is proactive defense means using attributed-based encryption and data self-deterministic schema to protect financial clients' privacy information. The proposed novel approach is named as Proactive Dynamic Secure Data Schema (P2DS), which is designed to ensure that the sensitive data cannot be directly used by the unanticipated party. Three algorithms have been proposed for P2DS, including Static Decryption Attribute Algorithm (SDAA), Corresponded Decryption Attribute Algorithm (CDAA), and Proactive Determinative Encryption Algorithm (PDEA). The main contributions of this paper are providing an effective method of protecting customers' privacy and reducing operating risks of the financial organizations. Our experiment has proved the validity and efficiency of the proposed schema.
KW - Cyber security
KW - Financial industry
KW - Mobile cloud computing
KW - Privacy protection
KW - Proactive secure schema
UR - https://www.scopus.com/pages/publications/84961743187
U2 - 10.1109/HPCC-CSS-ICESS.2015.250
DO - 10.1109/HPCC-CSS-ICESS.2015.250
M3 - Conference contribution
AN - SCOPUS:84961743187
T3 - Proceedings - 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security and 2015 IEEE 12th International Conference on Embedded Software and Systems, HPCC-CSS-ICESS 2015
SP - 1332
EP - 1337
BT - Proceedings - 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security and 2015 IEEE 12th International Conference on Embedded Software and Systems, HPCC-CSS-ICESS 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 17th IEEE International Conference on High Performance Computing and Communications, IEEE 7th International Symposium on Cyberspace Safety and Security and IEEE 12th International Conference on Embedded Software and Systems, HPCC-ICESS-CSS 2015
Y2 - 24 August 2015 through 26 August 2015
ER -