Trust aware cryptographic role based access control scheme for secure cloud data storage

نویسندگان

چکیده

Cloud data storage lets customers store vast amounts of cheaply on demand. Cryptographic role-based access control (RBAC) systems preserve cloud privacy by restricting to users. This study develops a trust model reason about and improve security in cryptographic RBAC systems. The degrees the user determine rights are performed User Activity Monitoring Agent (UAMA). Two different misconducts users such as policy violation leakage affect degree user, which turn upgrades policy. In addition, has decrypt for gaining information from it, is second line security. performance based scheme evaluated with respect parameters illegitimate detection, memory consumption, retrieval time proposed work performs better.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enforcing Role-Based Access Control for Secure Data Storage in Cloud Using Authentication and Encryption Techniques

With the fast advancement taking place in cloud computing and services, the culture to use the cloud for largescale data storage is being adopted. This growth in cloud computing has elevated the key security issue of how to control and avert illegitimate access to data stored in the cloud. Now a days most of the work concentrates on privacy of data contents and access control, whereas the atten...

متن کامل

Access Control Management for Secure Cloud Storage

With the widespread success and adoption of cloud-based solutions, we are witnessing an ever increasing reliance on external providers for storing and managing data. This evolution is greatly facilitated by the availability of solutions typically based on encryption ensuring the confidentiality of externally outsourced data against the storing provider itself. Selective application of encryptio...

متن کامل

Trust-Based Access Control for Secure Cloud Computing

Multi-tenancy, elasticity and dynamicity pose several novel challenges for access control in a cloud environment. Accessing subjects may dynamically change, resources requiring protection may be created or modified, and subject access requirements to resources may change during the course of the application execution. Users may need to acquire different permissions from different administrative...

متن کامل

Capability-based Cryptographic Data Access Control in Cloud Computing

Chittaranjan Hota, Sunil Sanka Department of Computer Science & Information Systems, BITS Pilani Hyderabad Campus, Hyderabad Email: [email protected], [email protected] Muttukrishnan Rajarajan Information Security Group, School of Engineering & Mathematical Sciences, City University, London Email: [email protected] Srijith K. Nair Security Futures Practice, BT Innovate and De...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Automatika

سال: 2023

ISSN: ['0005-1144', '1848-3380']

DOI: https://doi.org/10.1080/00051144.2023.2243144