Open Access Open Access  Restricted Access Subscription Access

A study on Time Sensitive Data Access Control

Dr Piyush Kumar Pareek, Chaitra Y R, Saumya L

Abstract


To properly protect stored private data, the device proprietor will exchange private data with a chosen few and issue decipherment keys to them. If the user has quit, the cloud will be permitted to compensate them in re-scrambling the details and will even design new decipherment keys for current customers so that they will receive the information. Since a circulated registering environment is affecting all the different cloud servers, identical charges can't be got, and death by several of the cloud servers because of competing framework trades. The suggested approach would require learning, that will be re-scrambled, at various sections of time. The guarantee is rendered on high modern cryptography basis, with strong security emphasis, so that fine-grained knowledge gets to every business, and they don't have to get intense coordination for precision.


Full Text:

PDF

References


Wan, Z., & Deng, R. H. (2011). HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE transactions on information forensics and security, 7(2), 743-754.

Yang K., Jia X., Ren X., Zhang B., Xie, R.(2013). DACMACS: Effective data access control for multi-authority cloud storage systems. Transactions on Information Forensics and Security,8(2),1790–1801.

Bertino, E., Bonatti, P. A., & Ferrari, E. (2001). TRBAC: A temporal role-based access control model. ACM Transactions on Information and System Security (TISSEC), 4(3), 191-233..

Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2012). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), 131-143.

Zhou, Z., Zhang, H., Zhang, Q., Xu, Y., & Li, P. (2014, December). Privacy-preserving granular data retrieval indexes for outsourced cloud data. In 2014 IEEE Global Communications Conference (pp. 601-606). IEEE.

Liu, Q., Tan, C. C., Wu, J., & Wang, G. (2011, December). Reliable re-encryption in unreliable clouds. In 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011 (pp. 1-5). IEEE.

Bethencourt, J., Sahai, A., & Waters, B. (2007, May). Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP'07) (pp. 321-334). IEEE.

Boneh, D., & Franklin, M. (2001, August). Identity-based encryption from the Weil pairing. In Annual international cryptology conference (pp. 213-229). Springer, Berlin, Heidelberg.

Yuan, K., Liu, Z., Jia, C., Yang, J., & Lv, S. (2013, September). Public key timed-release searchable encryption. In 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (pp. 241-248). IEEE.

Liu, Q., Wang, G., & Wu, J. (2014). Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Information sciences, 258, 355-370.


Refbacks

  • There are currently no refbacks.