SECRBAC : An Efficient and Secured Data Access Control Schemes in Cloud

Authors

  • P. Goutham  IFET College of Engineering,Villupuram, Tamil Nadu, India

Keywords:

SECRBAC, Data Access Control, Cloud, CSP, HASBE, CP-ABE

Abstract

An organizational data is to be encrypted for security reasons. In an institution the data stored in cloud by admin need authorization from an authorized person. Preliminary plans of authentication include an authorized person to gather information provided by admin with the help of code which is a private one and to be maintained by all non-users i.e. authorized persons. This process of providing code will take some time, and the wise usage of that time can be achieved by a direct authentication from authorized person with a considered code generation on direct authentication. This proposal contains identity based and proxy re-encryption algorithm widely used to protect from cloud computing. The authorization models contain evaluator key for user enrollment and also used to secret key generating for authorized user. Proxy means entity and re-encryption means without decryption it contains one more encryption. Identity encryption means a type of public key cryptography. This type of authorization model will result in a technical improvement in knowledge of computer usage.

References

  1. Cloud Security Alliance, "Security guidance for critical areas of focus in cloud computing v3.0," CSA, Tech. Rep., 2003.
  2. Y. Zhang, J. Chen, R. Du, L. Deng, Y. Xiang, and Q. Zhou, "Feacs: A flexible and efficient access control scheme for cloud computing," in Trust, Security and Privacy in Computing and Communications,2014 IEEE 13th International Conference on, Sept 2014, pp. 310–319.
  3. B. Waters, "Cipher text-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Public KeyCryptography - PKC 2011, 2011, vol. 6571, pp. 53–70.
  4. B. B and V. P, "Extensive survey on usage of attribute based encryption in cloud," Journal of Emerging Technologies in Web Intelligence, vol. 6, no. 3, 2014.
  5. International Committee for Information Technology Standards, "INCITS 494-2012 - information technology - role based access control - policy enhanced," INCITS, Standard, Jul. 2012.
  6. E. Coyne and T. R. Weil, "Abac and rbac: Scalable, flexible, and auditable access management," IT Professional, vol. 15, no. 3, pp. 14–16, 2013.
  7. F. Wang, Z. Liu, and C. Wang, "Full secure identity-based encryption scheme with short public key size over lattices in the standard model," Intl. Journal of Computer Mathematics, pp. 1–10, 2015.
  8. A. Lawall, D. Reichelt, and T. Schaller, "Resource management and authorization for cloud services," in Proceedings of the 7th International Conference on Subject-Oriented Business Process Management, ser. S-BPM ONE ’15, New York, NY, USA, 2015, pp. 18:1–18:8.
  9. D. Y. Chang, M. Benantar, J. Y.-c. Chang, and V. Venkataramappa, "Authentication and authorization methods for cloud computing platform security," Jan. 1 2015, uS Patent 20,150,007, 274.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
P. Goutham, " SECRBAC : An Efficient and Secured Data Access Control Schemes in Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.163-167, March-April-2017.