
Volume4,June 2017,
Topic : A Data Centric Access Control Solution with Role Based Expressiveness for Protecting User Data on Cloud
Authors:Nisha Ranjan Sah || Tejashwini P, Veeresh S, Yathish, Mrs. Prema.
Abstract:Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loss of control over their data and raises reasonable security concerns that slow down the adoption of Cloud computing. Is the Cloud service provider accessing the data? Is it legitimately applying the access control policy defined by the user? This paper presents a datacentric access control solution with enriched role-based expressiveness in which security is focused on protecting user data regardless the Cloud service provider that holds it. Novel identity-based and proxy re-encryption techniques are used to protect the authorization model. Data is encrypted and authorization rules are cryptographically protected to preserve user data against the service provider access or misbehavior. The authorization model provides high expressiveness with role hierarchy and resource hierarchy support. The solution takes advantage of the logic formalism provided by Semantic Web technologies, which enables advanced rule management like semantic conflict detection. A proof of concept implementation has been developed and a working prototypical deployment of the proposal has been integrated within Google service.
Keywords: Data-centric security, Cloud computing, Role-based access control, Authorization.
Download Paper
DOI: 01.1617/vol4/iss6/pid35681
Related Articles
Wormhole Attack Prevention and Detection Approaches in Mobile Ad hoc Networks: A Survey.
Authors: Avinash Singh || Ram Singar Verma
Doi : 01.1617/vol4/iss03/pid34591
Volume4 ,March 2017.
Developing a GIS Platform for Tourism marketing and promotion In Nigeria: Case Study Of Bauchi State
Authors: Abubakar Siddiq Ango || Abdulsalam Waheed Abdulfatah, Idrissa Djibo
Doi : 01.1617/vol3/iss09/pid91783
Volume3 ,September 2017.
Decentralized Trust Management and Trust Worthiness of Cloud Environments
Authors: Qhubaib Syed || Syed Afzal Ahmed,Syed Abdul Haq
Doi : 01.1617/vol4/iss4/pid21386
Volume4 ,April 2017.
Brain Controlled Chess Based on Virtual Reality Control for Paralyzed Patients
Authors: Sindhura Rao || Ashwini S,Kusuma Mohanchandra
Doi : 01.1617/vol4/iss4/pid82074
Volume4 ,April 2017.
Multilevel Authentication System
Authors: Nichita Silva Lobo || Beverly Rodrigues,Pavni Alluri,Prathibha Singh,Nicole Alvares
Doi : 01.1617/vol4/iss4/pid82135
Volume4 ,April 2017.
Stock Prediction Using Clustering And Regression Techniques
Authors: Shalini Lotlikar || Megha Ainapurkar
Doi : 01.1617/vol4/iss4/pid39708
Volume4 ,April 2017.
Brain Tumor Detection using Image Segmentation
Authors: Siddhi N. Nerurkar ||
Doi : 01.1617/vol4/iss4/pid02845
Volume4 ,April 2017.
Video Mining using Query by Example
Authors: Rosebud Valadares ||
Doi : 01.1617/vol4/iss4/pid89542
Volume4 ,April 2017.
Fuzzy Opinion Mining for Product Recommender System
Authors: Aarti Bandodker ||
Doi : 01.1617/vol4/iss4/pid03652
Volume4 ,April 2017.
Aadhaar and Server based Electoral system
Authors: Yugansh Garg || Sakshi Mishra
Doi : 01.1617/vol4/iss4/pid69053
Volume4 ,April 2017.