A data outsourcing architecture combining cryptography and access control

Author(s):  
Sabrina De Capitani di Vimercati ◽  
Sara Foresti ◽  
Sushil Jajodia ◽  
Stefano Paraboschi ◽  
Pierangela Samarati
Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 95057-95067
Author(s):  
Ling Liu ◽  
He Wang ◽  
Yuqing Zhang

2020 ◽  
Vol 10 (1) ◽  
pp. 64-84 ◽  
Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Cloud computing has introduced a paradigm which support data outsourcing to third parties for processing using commodity clusters. It allows the owner to outsource sensitive data and share it with the authorized user while reducing the computation and management cost. Since owners store sensitive data over the cloud, the requirements of access control and data security have also been increasing. To alleviate all the problem requirements, the need has arisen for providing a safe, secure, and sound model. The existing solutions for these problems use pure cryptographic techniques, which increases the computation cost. In this article, the security problems are solved by using a trusted third party and a quorum of key managers. A service provider is responsible for capability-based access control to ensure that only authorized users will be able to access the data. Whenever any data revocation is required, the data owner simply updates this information to the master key manager to revoke a specific number of shares. The model for the proposed work has been presented and its analysis shows how it introduces security features.


2014 ◽  
Vol 69 (6) ◽  
Author(s):  
Touraj Khodadadi ◽  
A. K. M. Muzahidul Islam ◽  
Sabariah Baharun ◽  
Shozo Komaki

Utilizing database encryption to safeguard data in several conditions where access control is not sufficient is unavoidable. Database encryption offers an extra layer of security to traditional access control methods. It stops users that are unauthorized, such as hackers breaking into a system, and observing private data. Consequently, data is safe even when the database is stolen or attacked. Nevertheless, the process of data decryption and encryption causes degradation in the database performance. In conditions where the entire information is kept in an encrypted format, it is not possible to choose the database content any longer. The data must be first decrypted, and as such, the unwilling and forced tradeoff occurs between the function and the security. The suitable methods to improve the function are techniques that directly deal with the data that is encrypted without having to decrypt them first. In this study, we determined privacy protection and issues that each organization should consider when it decides to outsource own data.  


2001 ◽  
Vol 84 (9) ◽  
pp. 16-26
Author(s):  
Tadao Saito ◽  
Hitoshi Aida ◽  
Terumasa Aoki ◽  
Soichiro Hidaka ◽  
Tredej Toranawigtrai ◽  
...  

2012 ◽  
Vol 1 (7) ◽  
pp. 78-79
Author(s):  
Anitha Chepuru ◽  
◽  
Dr.K.Venugopal Rao ◽  
Amardeep Matta
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document