Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search
نویسندگان
چکیده
The security and privacy issues regarding outsourcing data have risen significantly as cloud computing has grown in demand. Consequently, since management been delegated to an untrusted server the phase, access control identified a major problem storage systems. To overcome this problem, paper, of using Attribute-Based Access Control (ABAC) approach is utilized. First, must be stored strong for user data. This model takes into consideration some attributes authentication process that database uses maintain around recorded collections with user's saved keys. clusters registry message permission codes, usernames, group names, each its own set benefits. In advance, should encrypted transferred service provider it establishes still secure. But cases, supplier's measures are disrupting. result analysis various parameters such encryption time, decryption key generation also time consumption. storage, may verify existing method Ciphertext Policy Encryption (CP-ABE) Nth Truncated Ring Units (NTRU). 15% decreased by NTRU 31% reduced CP-ABE. proposed 7.64% 14% method.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملAttribute Based Secure Data Access in Cloud Computing
Cloud computing enables highly scalable services to be easily consumed over the Internet on an asneeded basis. Attribute Based Secure Data Access has proposed for access control of outsourced data in cloud computing. The person wants to sale their business logic to some others with attractive mechanism for showing the restricted portion. The idea proposed the business people have secure Uploadi...
متن کاملA Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage
Cloud storage service is one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage service has many advantages which include convenience, high computation and capacity, it attracts the user to outsource data in the cloud. However, the user outsources data directly in cloud storage service that is unsafe when outsourcing data is sensitive fo...
متن کاملk-Times Attribute-Based Anonymous Access Control for Cloud Computing
In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In additi...
متن کاملAttribute-Based Oblivious Access Control
In an attribute-based system (ABS), users are identified by various attributes, instead of their identities. Since its seminal introduction, the attribute-based mechanism has attracted a lot of attention. However, current ABS schemes have a number of drawbacks: (i) the communication cost is linear in the number of the required attributes; (ii) the computation cost is linear in the number of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of electrical and computer engineering systems
سال: 2022
ISSN: ['1847-6996', '1847-7003']
DOI: https://doi.org/10.32985/ijeces.13.7.9