Enforcing Access Control to Cloud With Preserved Users Privacy

نویسنده

  • M. C. Babu
چکیده

Access Control Policies defines the user roles and their access rights to the confidential data. Finegrained access control on confidential data hosted in the cloud are based on fine-grained encryption of the data in which data owners are in charge of encrypting the data before uploading them to the cloud and re-encrypting the data whenever user credentials change. When data owners perform the re-encryption they incur high communication and computation costs. To reduce the overhead at data owner, delegate the enforcement of access control to cloud, while assuring data confidentiality from the cloud. In order to delegate access control to cloud, an approach of two layers of encryption is proposed, in which the data owner performs a lower level encryption; whereas the cloud performs a higher level encryption. Using Policy Decomposition algorithm, decompose the ACP between the owner and cloud to perform the two layers of encryption. With TLE, the system guarantees the confidentiality of the data from cloud and preserves the privacy of users from the cloud while delegating most of the access control enforcement to the cloud.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

Policy Enforcement Framework for Cloud Data Management

Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such policies often prove inadequate...

متن کامل

Enforcing Role-Based Access Control for Secure Data Storage in Cloud Using Authentication and Encryption Techniques

With the fast advancement taking place in cloud computing and services, the culture to use the cloud for largescale data storage is being adopted. This growth in cloud computing has elevated the key security issue of how to control and avert illegitimate access to data stored in the cloud. Now a days most of the work concentrates on privacy of data contents and access control, whereas the atten...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015