International Journal of Scientific Engineering and Research (IJSER)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed | ISSN: 2347-3878


Downloads: 0

India | Computer Engineering | Volume 7 Issue 3, March 2019 | Pages: 31 - 35


A Survey on Data Centric Access Control with Role Based Proxy Re-encryption in Cloud Environment

Akhila Raj, Dr. K.S. Angel Viji

Abstract: The security solutions currently available are based on perimeter security. However, cloud computing breaks the organization perimeters. At the point when data resides within the cloud, they reside outside the structure bounds of an organization. Users may loss control over their data and it raises reasonable security issues that block the adoption of cloud computing. Those issues includes questions like: Is that the cloud service provider(CSP) a truthful person or he accessing the data? Is it genuinely apply the access control policy defined by the user? In this research paper we present a survey and analysis of different methods that are used for protection of data over cloud and also for making data accessing easy as possible. A novel identity-based and proxy re-encryption techniques are used to protect the authorization model. In this, data is encrypted and authorization rules are cryptographically protected to preserve user data against the service provider? s access or misbehavior.

Keywords: Authorization, Cloud computing, Data-centric security, Role-based access control.



Citation copied to Clipboard!

Rate this Article

5

Characters: 0

Received Comments

No approved comments available.

Rating submitted successfully!


Top