An Efficient Role-based Access Control on Encrypted Data in Cloud

نویسنده

  • D. Vijayakumar
چکیده

Cloud Computing is a virtualized compute power and storage delivered via platform-agnostic infrastructures of abstracted hardware and software accessed over the Internet. Cloud Computing involves delivering hosted services over the internet. These services are broadly categorized into three types, Infrastructure-as-a –Service (IaaS), Platform-as-a-Service(PaaS) and Software-as-a-Service(SaaS). It is a shared pool of resources, multiple users can share their information via cloud, and security is the main issue for use and shares their data. In this proposed work, an Efficient Role Based Access Control technique uses a public key cryptosystem is considered. First phase involves a user Identity Registration and Identity Token issuance and Role Based Key Generation for all the users assigned to a roles in a system. Second phase involves Data Encryption, along with roles and TokenID for that file, data are encrypting with appropriate role public keys. Third phase involves a Data Decryption, in which role based on their access policies can decrypt the data, and it is done by using their private key. This proposed work deployed in Cloud-Stack private cloud (IaaS). The entire system will enhance the confidentiality and authentication for the cloud users.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Mobile cloud computing provides the capability of sharing of the data that is encrypted with different user through cloud Storage. This raises the point of security issues over data confidentiality and authentication access control. The blind storage allows a client to store the number of files on remote server, where remote server is not familiar with the files that are stored in it. In Attrib...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015