8,976 Hits in 4.5 sec

Access Control Management for Secure Cloud Storage [chapter]

Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati
2017 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
We present the design and implementation of an approach to realize policy-based encryption for enforcing access control in OpenStack Swift.  ...  Selective application of encryption (i.e., with different keys depending on the authorizations holding on data) provides a convenient approach to access control policy enforcement.  ...  Finally, authorizations are realized by encrypting object keys with user keys.  ... 
doi:10.1007/978-3-319-59608-2_21 fatcat:aculgivxs5hbbf72suvufirfda

Cloud Based Electronic Health Record Security by Using Image Encryption

Athira P
2020 International Journal of Multidisciplinary in Cryptology and Information Security  
The security issues related to the patient details are encrypted with attributes related to it.An electronic health record is provided with attribute-based encryption to provide the secure entry of the  ...  This is made with an easy access technology as stored in a cloud so as to access it whenever necessary.  ...  An ABE system is a public key encryption system in which user's key is labeled with a set of attributes and the cyphertext is associated with an access policy. [8] The secret key of the user can decrypt  ... 
doi:10.30534/ijmcis/2020/02932020 fatcat:ms3usryumfacxjfsyhvspbwguu

The Intelligent Video Monitoring System Based on Cloud Storage and Safety

Ya-li ZHANG, Fei-yue YU
2018 DEStech Transactions on Computer Science and Engineering  
access control policy updates significantly.  ...  This article designs the intelligent video monitoring system based on cloud storage architecture, which can realize realtime video monitoring, video storage, device access, system management and other  ...  Users Download the Encoded Video Data Due to the association authorized users with the data of key encoded video, only the users with appropriate attributes can access the encrypted data.  ... 
doi:10.12783/dtcse/wcne2017/19895 fatcat:gublhrxerjfo5ghqfxqsdia5ta

Secure Retrieval of Sub-Trees over Encrypted Data Stored in Cloud Storage for Prediction

P. Shanthi, A. Umamakeswari
2016 Indian Journal of Science and Technology  
Shifting towards the services however leads to some security concerns like data leakage, unauthorized access and data privacy etc.  ...  Also securely retrieves subtree over the encrypted data.  ...  Ciphertext policy attribute-based encryption, a kind of Attribute based encryption, data is encrypted by embedding a policy defined over attributes of users and receivers whose attributes matches the policy  ... 
doi:10.17485/ijst/2016/v9i48/108028 fatcat:gf32u6mcgjdebnr46ic44tdneq

Secure Data Retrieval of Outsourced Data with Complex Query Support

Yan Zhu, Di Ma, Shanbiao Wang
2012 2012 32nd International Conference on Distributed Computing Systems Workshops  
Although this field has attracted tremendous research attention in the past a few years, most existing solutions do not support efficient searches with complex query conditions.  ...  In this paper, we propose a framework of multi-keyword secure data retrieval to meet the needs of secure data retrieval with complex query support by leveraging recent development in attribute-based encryptions  ...  In key-policy ABEs (KP-ABE) [5] , data is encrypted by a list of attributes while access tree structure (or access policy) is embedded into the key of an authorized user.  ... 
doi:10.1109/icdcsw.2012.91 dblp:conf/icdcsw/ZhuMW12 fatcat:m7sel7v6nzaqhom3c4w3lqftgi

Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks

Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, Ashish Gehani
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
Scopes are defined as policies over attributes of the individual nodes. The system transparently realizes the policies with suitable cryptographic primitives.  ...  We describe the design, implementation, and evaluation of a security framework that achieves this.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/2818000.2818001 dblp:conf/acsac/RaykovaLKG15 fatcat:i5nbyz7jgfbpdgkedg7duld36y

Cryptography and Data Security in Cloud Computing

Zheng Yan, Robert H. Deng, Vijay Varadharajan
2017 Information Sciences  
Moreover, it smartly ties both access policy and subscription policy by two secrets, thus successfully avoiding bypassing access/subscription policy checking procedure.  ...  Order Preserving Encryption (OPE) is a kind of encryption designed to support search on ciphertexts. But existing schemes suffer from the problems of security and ciphertext expansion.  ... 
doi:10.1016/j.ins.2016.12.034 fatcat:r234lwyjqva5rbc45mltma4hjq

An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation

Yuanbo Cui, Fei Gao, Yijie Shi, Wei Yin, Emmanouil Panaousis, Kaitai Liang
2020 IEEE Access  
Searchable encryption is an important tool to provide secure search over the encrypted cloud data without infringing data confidentiality and data privacy.  ...  To reduce the computation overhead, in this paper, we propose an ABMKS with only multiplication operations in encrypted keyword index generation.  ...  The authors declare that there are no conflicts of interest regarding the publication of this article.  ... 
doi:10.1109/access.2020.2996940 fatcat:zy4dkeoft5hulkwgxoqrinny5e

Towards Secure Data Retrieval for Multi-Tenant Architecture Using Attribute-Based Key Word Search

Hanshu Hong, Yunhao Xia, Zhixin Sun
2017 Symmetry  
In our scheme, a data owner can make a self-centric access policy of the encrypted data.  ...  Only when the possessing attributes match with the policy can a receiver generate a valid trapdoor and search the ciphertext.  ...  Han et al. in [15] proposed an attribute-based searchable encryption with key policy. Their scheme achieves flexible access control on the search indexes of ciphertext.  ... 
doi:10.3390/sym9060089 fatcat:etvkxxqoqnevtgymklhlwx4mti


Vidya M.S, Mala C Patil, Dr. Shiva Murthy G
2021 Indian Journal of Computer Science and Engineering  
The system is analytically conceptualized with two different novel algorithms which are tested under variable operating conditions and different set of data.  ...  The communication protocols are mostly being designed taking three crucial factors into account-i) Scalability, ii) Interoperability and iii) Security for network and physical layer attributes.  ...  One of the essential contributions of the proposed implementation planning is not to use any form of cryptographic policy for designing access control policy.  ... 
doi:10.21817/indjcse/2021/v12i6/211206137 fatcat:b6w737uvmjaghl3f74blgb2mvi

Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model

Pavithra P., Balamurugan K.
2018 Bonfring International Journal of Software Engineering and Soft Computing  
This paper presents a comprehensive mobile cloud design which provides an effective and secure cloud computing services on mobile devices.  ...  This paper proposes a novel architecture for adaptive encryption of public cloud databases that offers a proxy-free alternative to the system. cloud system is difficult to synchronize login and authentication  ...  The files are associated with file access policies, that used to access the files placed on the cloud.  ... 
doi:10.9756/bijsesc.8391 fatcat:z53h3fp6rzaobfelort5q6vj2u

An encryption-based access control framework for content-centric networking

Jun Kuriharay, Ersin Uzun, Christopher A. Wood
2015 2015 IFIP Networking Conference (IFIP Networking)  
The design of CCN-AC heavily relies on the concept of secure content object manifests and leverages them to decouple encrypted content from access policy and specifications for minimum communication overhead  ...  This framework is both flexible and extensible, enabling the specification, implementation, and enforcement of a variety of access control policies for sensitive content in the network.  ...  It can however take different values in order to realize different types of access policies 3 .  ... 
doi:10.1109/ifipnetworking.2015.7145300 dblp:conf/networking/KuriharayUW15 fatcat:3k24rjkkkfdy3kmectsbdtsmce

TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud

Jianan Hong, Kaiping Xue, Yingjie Xue, Weikeng Chen, David S. L. Wei, Nenghai Yu, Peilin Hong
2017 IEEE Transactions on Services Computing  
Based on the proposed scheme, we further propose an efficient approach to design access policies faced with diverse access requirements for time-sensitive data.  ...  In this paper, by embedding timed-release encryption into CP-ABE (Ciphertext-Policy Attribute-based Encryption), we propose a new time and attribute factors combined access control on time-sensitive data  ...  ACKNOWLEDGMENT The authors sincerely thank the anonymous referees for their invaluable suggestions that have led to the present improved version of the original manuscript.  ... 
doi:10.1109/tsc.2017.2682090 fatcat:vclsys4rx5fprohwqt474u3qaa

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services

Yiannis Verginadis, Antonis Michalas, Panagiotis Gouvas, Gunther Schiefer, Gerald Hübsch, Iraklis Paraskakis
2015 Proceedings of the 5th International Conference on Cloud Computing and Services Science  
Specifically, PaaSword involves a context-aware security model, the necessary policies enforcement and governance mechanisms along with a physical distribution, encryption and query middleware, aimed at  ...  PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services.  ...  In Section 3, we introduce a holistic, data privacy and security by design, framework enhanced by sophisticated context-aware access models and robust policy enforcement and governance mechanisms, aimed  ... 
doi:10.5220/0005489302060213 dblp:conf/closer/VerginadisMGSHP15 fatcat:ufkcxotuwzgrfc3rldabixxf5q

D3.2 - Annual Releases of the TheFSM Data Platform

Danai Vergeti, Dimitris Ntalaperas, Iosif Angelidis
2021 Zenodo  
Towards this we present TheFSM backbone infrastructure that will support the implementation and deployment of TheFSM platform, the technology stack of TheFSM backbone infrastructure, the access information  ...  for the services of TheFSM backbone infrastructure, we present TheFSM platform's prototype for M12 and additional low-fidelity mock-ups which were designed for all the main functionalities of the data  ...  Figure 9 : 9 ABAC policies management and authorization. Figure 10 : 10 Advanced policy query builder. Figure 11 : 11 The policy enforcer testing tool.  ... 
doi:10.5281/zenodo.4593668 fatcat:vesfhc4h4ne7lnagtheotaswka
« Previous Showing results 1 — 15 out of 8,976 results