Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search

نویسندگان

چکیده

The security and privacy issues regarding outsourcing data have risen significantly as cloud computing has grown in demand. Consequently, since management been delegated to an untrusted server the phase, access control identified a major problem storage systems. To overcome this problem, paper, of using Attribute-Based Access Control (ABAC) approach is utilized. First, must be stored strong for user data. This model takes into consideration some attributes authentication process that database uses maintain around recorded collections with user's saved keys. clusters registry message permission codes, usernames, group names, each its own set benefits. In advance, should encrypted transferred service provider it establishes still secure. But cases, supplier's measures are disrupting. result analysis various parameters such encryption time, decryption key generation also time consumption. storage, may verify existing method Ciphertext Policy Encryption (CP-ABE) Nth Truncated Ring Units (NTRU). 15% decreased by NTRU 31% reduced CP-ABE. proposed 7.64% 14% method.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Attribute Based Secure Data Access in Cloud Computing

Cloud computing enables highly scalable services to be easily consumed over the Internet on an asneeded basis. Attribute Based Secure Data Access has proposed for access control of outsourced data in cloud computing. The person wants to sale their business logic to some others with attractive mechanism for showing the restricted portion. The idea proposed the business people have secure Uploadi...

متن کامل

A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage

Cloud storage service is one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage service has many advantages which include convenience, high computation and capacity, it attracts the user to outsource data in the cloud. However, the user outsources data directly in cloud storage service that is unsafe when outsourcing data is sensitive fo...

متن کامل

k-Times Attribute-Based Anonymous Access Control for Cloud Computing

In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In additi...

متن کامل

Attribute-Based Oblivious Access Control

In an attribute-based system (ABS), users are identified by various attributes, instead of their identities. Since its seminal introduction, the attribute-based mechanism has attracted a lot of attention. However, current ABS schemes have a number of drawbacks: (i) the communication cost is linear in the number of the required attributes; (ii) the computation cost is linear in the number of the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of electrical and computer engineering systems

سال: 2022

ISSN: ['1847-6996', '1847-7003']

DOI: https://doi.org/10.32985/ijeces.13.7.9