Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing

2016 ◽  
Vol 10 (4) ◽  
pp. 44-57 ◽  
Author(s):  
Azin Moradbeikie ◽  
Saied Abrishami ◽  
Hasan Abbasi

Nowadays, Cloud Computing is considered one of the important fields in both research and industry. Users enjoy membership of cloud providing effective services called time-limited services. This paper addresses time-limited services offering an attribute-based access control method and time-limited attributes providing users' time-limited membership in cloud service. The proposed method authenticates users for specific time limit after which they are considered invalid. This method is decentralized resistible against backward and forward attacks. Moreover, this approach compared to other approaches reduces calculation and communication overhead.

2021 ◽  
pp. 10805-10814
Author(s):  
Dr. T. Dheepak

Cloud computing is the emerging technology where resources are available pay as you go basis. Cloud storage technology provides the large pool of storage capacity to the cloud users. Providing security to the data stored in cloud is the major concern. So, Security can be enhanced by providing access control to the authorized users. Access control gives the authorization to the users which gives the access privileges on data and other resources. Access control can be enabled in most of the computing environment such as Peer to Peer, Grid and Cloud.Access control is an important measure for the protection of information and system resources to prevent illegitimate users from getting access to protected objects and legitimate users from attempting to access the objects in ways that exceed what they are allowed. The restriction placed on access from a subject to an object is determined by the access policy. With the rapid development of cloud computing, cloud security has increasingly become a common concern and should be dealt with seriously.  In this paper, an enhanced access control mechanism is proposed with hierarchical attribute-based access control method.


2018 ◽  
Vol 7 (3) ◽  
pp. 1795
Author(s):  
Rini Mahajan ◽  
Manish Mahajan ◽  
Dheerendra Singh

Cloud computing has changed the perspective of information storage worldwide; still it has not fully matured. Security, privacy and access control of the stored data is the biggest concern in the IT industries and these are the major research areas in the field of cloud computing. Although many researchers have proposed variety of access control methods, still there is a scope of improvement. The main objective of this paper is to study the limitations of formerly proposed access control methods and to propose a better new access control method. It is the combination of Attribute based access control (ABAC), Hierarchical Role based access control (HRBAC) and Policy based authentica-tion. As a result we got a fine grained access control method. It also includes the feature of role delegation which is very important in pre-sent scenarios. Comparative analysis shows that proposed method combined many new features with existing access control methods to make the system sound.  


Author(s):  
Cheng-Yu Cheng ◽  
Hang Liu ◽  
Li-Tse Hsieh ◽  
Edward Colbert ◽  
Jin-Hee Cha

2018 ◽  
Vol 30 (4) ◽  
pp. 14-31 ◽  
Author(s):  
Suyel Namasudra ◽  
Pinki Roy

This article describes how nowadays, cloud computing is one of the advanced areas of Information Technology (IT) sector. Since there are many hackers and malicious users on the internet, it is very important to secure the confidentiality of data in the cloud environment. In recent years, access control has emerged as a challenging issue of cloud computing. Access control method allows data accessing of an authorized user. Existing access control schemes mainly focus on the confidentiality of the data storage. In this article, a novel access control scheme has been proposed for efficient data accessing. The proposed scheme allows reducing the searching cost and accessing time, while providing the data to the user. It also maintains the security of the user's confidential data.


Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


2013 ◽  
pp. 814-834
Author(s):  
Hassan Takabi ◽  
James B.D. Joshi

Cloud computing paradigm is still an evolving paradigm but has recently gained tremendous momentum due to its potential for significant cost reduction and increased operating efficiencies in computing. However, its unique aspects exacerbate security and privacy challenges that pose as the key roadblock to its fast adoption. Cloud computing has already become very popular, and practitioners need to provide security mechanisms to ensure its secure adoption. In this chapter, the authors discuss access control systems and policy management in cloud computing environments. The cloud computing environments may not allow use of a single access control system, single policy language, or single management tool for the various cloud services that it offers. Currently, users must use diverse access control solutions available for each cloud service provider to secure data. Access control policies may be composed in incompatible ways because of diverse policy languages that are maintained separately at every cloud provider. Heterogeneity and distribution of these policies pose problems in managing access policy rules for a cloud environment. In this chapter, the authors discuss challenges of policy management and introduce a cloud based policy management framework that is designed to give users a unified control point for managing access policies to control access to their resources no matter where they are stored.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1088 ◽  
Author(s):  
Mohammad Ali ◽  
Mohammad-Reza Sadeghi ◽  
Ximeng Liu

Wireless Body Area Network (WBAN) is a highly promising technology enabling health providers to remotely monitor vital parameters of patients via tiny wearable and implantable sensors. In a WBAN, medical data is collected by several tiny sensors and usually transmitted to a server-side (e.g., a cloud service provider) for long-term storage and online/offline processing. However, as the health data includes several sensitive information, providing confidentiality and fine-grained access control is necessary to preserve the privacy of patients. In this paper, we design an attribute-based encryption (ABE) scheme with lightweight encryption and decryption mechanisms. Our scheme enables tiny sensors to encrypt the collected data under an access control policy by performing very few computational operations. Also, the computational overhead on the users in the decryption phase is lightweight, and most of the operations are performed by the cloud server. In comparison with some excellent ABE schemes, our encryption mechanism is more than 100 times faster, and the communication overhead in our scheme decreases significantly. We provide the security definition for the new primitive and prove its security in the standard model and under the hardness assumption of the decisional bilinear Diffie-Hellman (DBDH) problem.


Sign in / Sign up

Export Citation Format

Share Document