Enforcing Access Control to Cloud With Preserved Users Privacy
نویسنده
چکیده
Access Control Policies defines the user roles and their access rights to the confidential data. Finegrained access control on confidential data hosted in the cloud are based on fine-grained encryption of the data in which data owners are in charge of encrypting the data before uploading them to the cloud and re-encrypting the data whenever user credentials change. When data owners perform the re-encryption they incur high communication and computation costs. To reduce the overhead at data owner, delegate the enforcement of access control to cloud, while assuring data confidentiality from the cloud. In order to delegate access control to cloud, an approach of two layers of encryption is proposed, in which the data owner performs a lower level encryption; whereas the cloud performs a higher level encryption. Using Policy Decomposition algorithm, decompose the ACP between the owner and cloud to perform the two layers of encryption. With TLE, the system guarantees the confidentiality of the data from cloud and preserves the privacy of users from the cloud while delegating most of the access control enforcement to the cloud.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملA centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملPolicy Enforcement Framework for Cloud Data Management
Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such policies often prove inadequate...
متن کاملEnforcing Role-Based Access Control for Secure Data Storage in Cloud Using Authentication and Encryption Techniques
With the fast advancement taking place in cloud computing and services, the culture to use the cloud for largescale data storage is being adopted. This growth in cloud computing has elevated the key security issue of how to control and avert illegitimate access to data stored in the cloud. Now a days most of the work concentrates on privacy of data contents and access control, whereas the atten...
متن کامل