A CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
نویسندگان
چکیده
With the limited computing power cloud permit users to outsource their data. However, a security issue has been always obstacle to the use of computing outsourcing. Recently, there is huge growth in the use of number of security passwords for web based application and encryption keys required to securely outsource the data. User encrypts the data using encryption before uploading it on cloud and provides access rights to the other user i.e. shared data with other authorized users of cloud. While uploading data to the cloud data owner also have to outsource their password and data encryption keys to CSP. Such outsourcing of password and encryption keys attracts attention of many users with security and privacy point of view. Users don’t have fully trust on CSP as they don’t have guidance of how to access and manage user’s keys. This is the main reason behind that user worried to outsource their important information on cloud. Previously existed systems are not much intelligent to preserve data integrity, privacy policy of searching etc. To make efficient management of user private data as well as to securely preserve user’s data encryption keys on cloud there is need of such system which provides the guarantee of security and privacy to the end user for their outsourcing data and for proper key management. Bloom filter is space-efficient probabilistic data structure designed to specify whether an element is present or not in the set. It is rapid and memory efficient strategy which we contribute in our proposed work. It can save search space and time of searching as it does not require too many transactions to the database as frequent data stored in cache.
منابع مشابه
Effective Data Access Control for Multi-Authority Cloud Storage with Intrusion Detection
Business Record (BR) is an emerging centric model of information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as business information could be exposed to those third party servers and to unauthorized parties. To assure the business data control over access to their own BRs, it is a promising method to ...
متن کاملPolicy Provisioning for Distributed Identity Management Systems
A policy provisioning framework is described that supports the management of the lifecycle of identity information distributed beyond security domains. A model for creating data handling policies reflecting the intentions of its system administrator and the privacy preferences of the data owner is explained. Also, algorithms for systematically integrating data handling policies from system enti...
متن کاملAn Authorization Framework for Database Systems
Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...
متن کاملFine-grained Access of Personal Health Record in Cloud Computing
Cloud computing is used broadly in various services which maintain Personal Health Record (PHR). It is an emerging Health-centric model of patient health information interchange. Personal Health Record (PHR) information can be stored in a third party server i.e.Cloud server. The most important issues are fine–grained access, cryptographically enforced data access control, scalability in key man...
متن کاملA Threshold-based Model for Privacy Protection in Cloud Computing
Privacy for cloud computing has become an important issue in recent years. In this paper, we propose a threshold-based model for privacy protection in cloud computing with a particular (n +1, t +1) secret sharing scheme which is bases on the matrix and vector. We show how our (n +1, t +1) secret sharing scheme can be applied to protect privacy. First, we assign each row of the matrix as a key o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016