Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management

2019 ◽  
Vol 34 (1) ◽  
pp. 133-154
Author(s):  
Fateh Boucenna ◽  
Omar Nouali ◽  
Samir Kechid ◽  
M. Tahar Kechadi

In recent years the storage of cloud platform was increased a lot. Large set of personal and business data can be stored and accessed at anywhere at any time. Data’s are stored in a secured manner using various secured and optimized algorithms. Over this data theft and modifications are done in a highly manner. Therefore this creates a various security risks and data theft problems in cloud. There is need of security technique to overcome this problem. A proposed technique called cloud data centre technique is a new model for securing data from different attacks and security risks. This technique incorporate the FEBER and CUSCUM algorithms, which will monitor the user activity and then identify the legitimacy and prevent from any unauthorized user access. This data center technique can be used to detect and avoid data theft attacks by malicious insiders. The anonymous and miss use of data also prevented in a very good manner while compared to other techniques


2020 ◽  
Vol 1 (1) ◽  
pp. 18-21
Author(s):  
Sri Handriana Dewi Hastuti

Government Work Units to use a one data policy approach. The purpose of using this data includes the use of data for schools, taking care of data licensing, managing social assistance, all of which must be the same as the data sources in the Population and Civil Registration Office so that no more people have different identities. Based on the Minister of Home Affairs Regulation No. 61 of 2015 concerning Requirements, Scope and Procedures for Granting Access Rights and Utilization of Population Identification Number, Population Data, and Electronic Resident Identity Cards, data utilization access permits are granted by the Regent / Mayor. After submitting the permit to the Regent / Mayor, then the Cooperation Agreement (PKS) is signed. Furthermore, the Regional Apparatus Organization or public service agencies form a Technical Team implementing the cooperation. Furthermore, data access will be given according to their needs and usage. The user access institution will be monitored by the Regent / Mayor through the Department of population and civil registration, and periodic control, supervision and evaluation will be conducted.


In the future generation would development of new technologies, such as cloud computing, Internet of things (IOT), used in the medical field from concept to practice. Health care medical field is the major import role in cloud computing. The E-medical record contains the Healthcare providers HIS, but its deployment process slow due to high cost and high maintenance cost. In this paper study, electronic medic records with cloudbased security and access rights. In the cloud data ware house contained for all hospital patients details. Cloud middleware gives a platform for electronic healthcare system. It is provides to secure access the medical health record only authorized users and avoid unauthorized user. In this paper, proposed cloud computing design, which enables the secure and collaborative Emedical records among the all the hospitals with case of access rights.


2016 ◽  
Vol 89 ◽  
pp. 293-300 ◽  
Author(s):  
S. Raghavendra ◽  
K. Meghana ◽  
P.A. Doddabasappa ◽  
C.M. Geeta ◽  
Rajkumar Buyya ◽  
...  

2001 ◽  
Vol 40 (3-4) ◽  
pp. 245-251
Author(s):  
Simon Inger ◽  
Joanne Deeken

2020 ◽  
Vol 5 (1) ◽  
pp. 1-6
Author(s):  
Sudiana Sudiana ◽  
Alwin Ponco Nugroho ◽  
Muhammad Alif Ridho ◽  
Timotius Christian Prawira

The purpose of this paper is analyze and evaluate the features of an XYZ application at PT. XYZ and develop features make easier for customers in invoicing, accounting, and inventory. Evaluation uses direct interview techniques to users and analysis using the Unified Modeling Language (UML) Diagram to visualize, design, and document features in the XYZ application. The results of this paper are develop features such as User Access Rights, Reminder via Email, Multi Location, Import & Export Data, and Advance Invoice Settings, which development provides more customer service to make it easier and more efficient when using applications XYZ.


Sign in / Sign up

Export Citation Format

Share Document