Role based access control using identity and broadcast based encryption for securing cloud data

被引:0
作者
Urvashi Rahul Saxena
Taj Alam
机构
[1] Jaypee Institute of Information Technology,Department of Computer Science & Engineering and Information Technology
[2] Noida,undefined
来源
Journal of Computer Virology and Hacking Techniques | 2022年 / 18卷
关键词
Role Based Encryption (RBE); Data integrity; Identity and Broadcast based Encryption; Cloud Data Security;
D O I
暂无
中图分类号
学科分类号
摘要
Since integrity of data on cloud cannot be assured, several clients and users hesitate to upload their crucial data to the cloud, which eventually hinders cloud storage development. One of the biggest challenges with respect to cloud security is to ensure data confidentiality and one of the solutions to this issue can be by restricting unauthorized access to user data stored on cloud. In due course of time much research has been proposed using cryptographic techniques along with access control model(s) to deal with security issues pertaining to untrusted cloud environments. This work illustrates Role-Based access control policies over user data and permits the owner of the data to store it in an encrypted pattern to the cloud, thereby, allowing only permissible roles to access the data. Hence, the proposed work is an amalgamation of Role-Based Encryption (RBE) scheme using Identity and Broadcast based Encryption scheme to ensure data integrity in public clouds. In this paper we discuss the usage of several algorithmic modules that demonstrates how roles are governed by the membership rights, user revocation, encryption and decryption processes. Finally, the proposed model is compared with its peers on the basis of encryption and decryption time.
引用
收藏
页码:171 / 182
页数:11
相关论文
共 50 条
  • [31] Flexible access control mechanism for cloud stored EHR using consortium blockchain
    Exceline, C. Eben
    Nagarajan, Sivakumar
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (01) : 503 - 518
  • [32] Flexible access control mechanism for cloud stored EHR using consortium blockchain
    C. Eben Exceline
    Sivakumar Nagarajan
    International Journal of System Assurance Engineering and Management, 2024, 15 : 503 - 518
  • [33] Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security
    Balamurugan, V.
    Karthikeyan, R.
    Sundaravadivazhagan, B.
    Cyriac, Robin
    WIRELESS NETWORKS, 2023, 29 (02) : 523 - 537
  • [34] Data integrity and availability in cloud computing based on Megastore
    Yu, Yueyue
    Qin, Sujuan
    Wen, Qiaoyan
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 1062 - 1066
  • [35] RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage
    Guo, Zirui
    Zhang, Kai
    Wei, Lifei
    Chen, Siyuan
    Wang, Liangliang
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 141
  • [36] Identity-Based Dynamic Data Auditing for Big Data Storage
    Shang, Tao
    Zhang, Feng
    Chen, Xingyue
    Liu, Jianwei
    Lu, Xinxi
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (06) : 913 - 921
  • [37] Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security
    V. Balamurugan
    R. Karthikeyan
    B. Sundaravadivazhagan
    Robin Cyriac
    Wireless Networks, 2023, 29 : 523 - 537
  • [38] Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity
    Chen, Shaobo
    Li, Jiguo
    Zhang, Yichen
    Han, Jinguang
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10441 - 10451
  • [39] ID-PAPC: Identity based Public Auditing Protocol for Cloud Computing
    Garg, Neenu
    Bawa, Seema
    2017 IEEE INTERNATIONAL WIE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (IEEE WIECON-ECE 2017), 2017, : 14 - 17
  • [40] Lightweight integrity verification scheme for cloud based group data
    Liu Y.-F.
    Wang Y.-J.
    Fu S.-J.
    Tongxin Xuebao/Journal on Communications, 2016, 37 : 140 - 146