Security as a service for user customized data protection

Kenichi Takahashi, Takanori Matsuzaki, Tsunenori Mine, Takao Kawamura, Kazunori Sugahara

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Some of Internet services require users to provide their sensitive information such as credit card number, and an ID-password pair. In these services, the manner in which the provided information is used is solely determined by the service providers. As a result, even when the manner in which information is used by a service provider appears vulnerable, users have no choice but to allow such usage. In this paper, we propose a framework that enables users to select the manner in which their sensitive information is protected. In our framework, a policy, which defines the type of information protection, is offered as a Security as a Service. According to the policy, users can incorporate the type of information protection into a program. By allowing a service provider to use their sensitive information through this program, users can protect their sensitive information according to the manner chosen by them.

Original languageEnglish
Title of host publicationSoftware Engineering and Computer Systems - Second International Conference, ICSECS 2011, Proceedings
Pages298-309
Number of pages12
EditionPART 2
DOIs
Publication statusPublished - 2011
Event2nd International Conference on Software Engineering and Computer Systems, ICSECS 2011 - Kuantan, Malaysia
Duration: Jun 27 2011Jun 29 2011

Publication series

NameCommunications in Computer and Information Science
NumberPART 2
Volume180 CCIS
ISSN (Print)1865-0929

Other

Other2nd International Conference on Software Engineering and Computer Systems, ICSECS 2011
Country/TerritoryMalaysia
CityKuantan
Period6/27/116/29/11

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Mathematics(all)

Fingerprint

Dive into the research topics of 'Security as a service for user customized data protection'. Together they form a unique fingerprint.

Cite this