A Survey on Data Centric Access Control with Role Based Proxy Re-encryption in Cloud Environment
Journal: International Journal of Scientific Engineering and Research (IJSER) (Vol.7, No. 3)Publication Date: 2019-03-05
Authors : Akhila Raj; K.S. Angel Viji;
Page : 31-35
Keywords : Authorization; Cloud computing; Data-centric security; Role-based access control.;
Abstract
The security solutions currently available are based on perimeter security. However, cloud computing breaks the organization perimeters. At the point when data resides within the cloud, they reside outside the structure bounds of an organization. Users may loss control over their data and it raises reasonable security issues that block the adoption of cloud computing. Those issues includes questions like: Is that the cloud service provider(CSP) a truthful person or he accessing the data? Is it genuinely apply the access control policy defined by the user? In this research paper we present a survey and analysis of different methods that are used for protection of data over cloud and also for making data accessing easy as possible. A novel identity-based and proxy re-encryption techniques are used to protect the authorization model. In this, data is encrypted and authorization rules are cryptographically protected to preserve user data against the service provider? s access or misbehavior.
Other Latest Articles
Last modified: 2021-07-08 16:35:43