Manuscript Number : CSEIT172225
SECRBAC : An Efficient and Secured Data Access Control Schemes in Cloud
Authors(1) :-P. Goutham
An organizational data is to be encrypted for security reasons. In an institution the data stored in cloud by admin need authorization from an authorized person. Preliminary plans of authentication include an authorized person to gather information provided by admin with the help of code which is a private one and to be maintained by all non-users i.e. authorized persons. This process of providing code will take some time, and the wise usage of that time can be achieved by a direct authentication from authorized person with a considered code generation on direct authentication. This proposal contains identity based and proxy re-encryption algorithm widely used to protect from cloud computing. The authorization models contain evaluator key for user enrollment and also used to secret key generating for authorized user. Proxy means entity and re-encryption means without decryption it contains one more encryption. Identity encryption means a type of public key cryptography. This type of authorization model will result in a technical improvement in knowledge of computer usage.
IFET College of Engineering,Villupuram, Tamil Nadu, India
SECRBAC, Data Access Control, Cloud, CSP, HASBE, CP-ABE
- Cloud Security Alliance, "Security guidance for critical areas of focus in cloud computing v3.0," CSA, Tech. Rep., 2003.
- Y. Zhang, J. Chen, R. Du, L. Deng, Y. Xiang, and Q. Zhou, "Feacs: A flexible and efficient access control scheme for cloud computing," in Trust, Security and Privacy in Computing and Communications,2014 IEEE 13th International Conference on, Sept 2014, pp. 310–319.
- B. Waters, "Cipher text-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Public KeyCryptography - PKC 2011, 2011, vol. 6571, pp. 53–70.
- B. B and V. P, "Extensive survey on usage of attribute based encryption in cloud," Journal of Emerging Technologies in Web Intelligence, vol. 6, no. 3, 2014.
- International Committee for Information Technology Standards, "INCITS 494-2012 - information technology - role based access control - policy enhanced," INCITS, Standard, Jul. 2012.
- E. Coyne and T. R. Weil, "Abac and rbac: Scalable, flexible, and auditable access management," IT Professional, vol. 15, no. 3, pp. 14–16, 2013.
- F. Wang, Z. Liu, and C. Wang, "Full secure identity-based encryption scheme with short public key size over lattices in the standard model," Intl. Journal of Computer Mathematics, pp. 1–10, 2015.
- A. Lawall, D. Reichelt, and T. Schaller, "Resource management and authorization for cloud services," in Proceedings of the 7th International Conference on Subject-Oriented Business Process Management, ser. S-BPM ONE ’15, New York, NY, USA, 2015, pp. 18:1–18:8.
- D. Y. Chang, M. Benantar, J. Y.-c. Chang, and V. Venkataramappa, "Authentication and authorization methods for cloud computing platform security," Jan. 1 2015, uS Patent 20,150,007, 274.
Published in : Volume 2 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 163-167
Manuscript Number : CSEIT172225
Publisher : Technoscience Academy
URL : http://ijsrcseit.com/CSEIT172225