Role based access control using identity and broadcast based encryption for securing cloud data

被引:0
|
作者
Urvashi Rahul Saxena
Taj Alam
机构
[1] Jaypee Institute of Information Technology,Department of Computer Science & Engineering and Information Technology
[2] Noida,undefined
关键词
Role Based Encryption (RBE); Data integrity; Identity and Broadcast based Encryption; Cloud Data Security;
D O I
暂无
中图分类号
学科分类号
摘要
Since integrity of data on cloud cannot be assured, several clients and users hesitate to upload their crucial data to the cloud, which eventually hinders cloud storage development. One of the biggest challenges with respect to cloud security is to ensure data confidentiality and one of the solutions to this issue can be by restricting unauthorized access to user data stored on cloud. In due course of time much research has been proposed using cryptographic techniques along with access control model(s) to deal with security issues pertaining to untrusted cloud environments. This work illustrates Role-Based access control policies over user data and permits the owner of the data to store it in an encrypted pattern to the cloud, thereby, allowing only permissible roles to access the data. Hence, the proposed work is an amalgamation of Role-Based Encryption (RBE) scheme using Identity and Broadcast based Encryption scheme to ensure data integrity in public clouds. In this paper we discuss the usage of several algorithmic modules that demonstrates how roles are governed by the membership rights, user revocation, encryption and decryption processes. Finally, the proposed model is compared with its peers on the basis of encryption and decryption time.
引用
收藏
页码:171 / 182
页数:11
相关论文
共 50 条
  • [21] Using Location Based Encryption to Improve the Security of Data Access in Cloud Computing
    Abolghasemi, Meer Soheil
    Sefidab, Mandi Mokarrami
    Atani, Reza Ebrahimi
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 261 - 265
  • [22] Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails
    Wei, Jianghong
    Chen, Xiaofeng
    Wang, Jianfeng
    Hu, Xuexian
    Ma, Jianfeng
    COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 134 - 150
  • [23] Cryptography in the cloud: securing cloud data with encryption
    Mani, A.
    Kakade, Kiran Shrimant
    Therasa, P. R.
    Vanitha, M.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (05) : 577 - 589
  • [24] An Access Control Model for Cloud Storage Using Attribute-Based Encryption
    Sukhodolskiy, Ilya A.
    Zapechnikov, Sergey V.
    PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 578 - 581
  • [25] Security of identity-based broadcast encryption
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
  • [26] Securing medical data by role-based user policy with partially homomorphic encryption in AWS cloud
    Boomija, M. D.
    Raja, S. V. Kasmir
    SOFT COMPUTING, 2023, 27 (01) : 559 - 568
  • [27] Vulnerability of an identity based broadcast encryption scheme
    Wang, Xu'an
    Yang, Xiaoyuan
    Wu, Guangming
    Ding, Yi
    Journal of Information and Computational Science, 2011, 8 (16): : 4143 - 4148
  • [28] Generalized Identity Based and Broadcast Encryption Schemes
    Boneh, Dan
    Hamburg, Michael
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 455 - 470
  • [29] Securing Web services using Identity-based Encryption (IBE)
    Haaland, Kari Anne
    Rong, Chunming
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 413 - +
  • [30] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257