Role based access control using identity and broadcast based encryption for securing cloud data

被引:0
作者
Urvashi Rahul Saxena
Taj Alam
机构
[1] Jaypee Institute of Information Technology,Department of Computer Science & Engineering and Information Technology
[2] Noida,undefined
来源
Journal of Computer Virology and Hacking Techniques | 2022年 / 18卷
关键词
Role Based Encryption (RBE); Data integrity; Identity and Broadcast based Encryption; Cloud Data Security;
D O I
暂无
中图分类号
学科分类号
摘要
Since integrity of data on cloud cannot be assured, several clients and users hesitate to upload their crucial data to the cloud, which eventually hinders cloud storage development. One of the biggest challenges with respect to cloud security is to ensure data confidentiality and one of the solutions to this issue can be by restricting unauthorized access to user data stored on cloud. In due course of time much research has been proposed using cryptographic techniques along with access control model(s) to deal with security issues pertaining to untrusted cloud environments. This work illustrates Role-Based access control policies over user data and permits the owner of the data to store it in an encrypted pattern to the cloud, thereby, allowing only permissible roles to access the data. Hence, the proposed work is an amalgamation of Role-Based Encryption (RBE) scheme using Identity and Broadcast based Encryption scheme to ensure data integrity in public clouds. In this paper we discuss the usage of several algorithmic modules that demonstrates how roles are governed by the membership rights, user revocation, encryption and decryption processes. Finally, the proposed model is compared with its peers on the basis of encryption and decryption time.
引用
收藏
页码:171 / 182
页数:11
相关论文
共 50 条
  • [41] Merkle Tree and Blockchain-Based Cloud Data Auditing
    Mohan, Arun Prasad
    Asfak, Mohamed R.
    Gladston, Angelin
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2020, 10 (03) : 54 - 66
  • [42] Lightweight integrity verification scheme for cloud based group data
    Liu Y.-F.
    Wang Y.-J.
    Fu S.-J.
    Tongxin Xuebao/Journal on Communications, 2016, 37 : 140 - 146
  • [43] ID-based dynamic replicated data auditing for the cloud
    Yu, Haiyang
    Cai, Yongquan
    Sinnott, Richard O.
    Yang, Zhen
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (11)
  • [44] Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios
    Li, Jing
    Wang, Licheng
    Wang, Lihua
    Wang, Xianmin
    Huang, Zhengan
    Li, Jin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (22)
  • [45] Integrity checking protocol with identity-based proxy signature in mobile cloud computing
    Yan, Li
    Shi, Run-Hua
    Zhong, Hong
    Cui, Jie
    Zhang, Shun
    Xu, Yan
    Tongxin Xuebao/Journal on Communications, 2015, 36 (10): : 278 - 286
  • [46] Modified Apriori Based Data Sanitization for Cloud Data Security: An Optimization Assisted Model
    Dhamdhere, Shrikant D.
    Sivakkumar, M.
    Subramanian, V.
    CYBERNETICS AND SYSTEMS, 2023, 54 (08) : 1348 - 1374
  • [47] On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage
    Li, Xiong
    Liu, Shanpeng
    Lu, Rongxing
    Zhang, Xiaosong
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (06) : 975 - 977
  • [48] A Blockchain-Based Flexible Data Auditing Scheme for the Cloud Service
    Fan Kefeng
    Li Fei
    Yu Haiyang
    Yang Zhen
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (06) : 1159 - 1166
  • [49] A data integrity verification service for cloud storage based on building blocks
    Reyes-Anastacio, Hugo G.
    Gonzalez-Compean, J. L.
    Morales-Sandoval, Miguel
    Carretero, Jesus
    2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2018, : 201 - 206
  • [50] Toward Data Integrity Architecture for Cloud-Based AI Systems
    Witanto, Elizabeth Nathania
    Oktian, Yustus Eko
    Lee, Sang-Gon
    SYMMETRY-BASEL, 2022, 14 (02):