Securing Data Using Role Based Access Control for Data Centric Approach
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
Currently all security arrangements are based on perimeter security. However, Use of cloud computing breaks the organization borders. When organisational data stored on the Cloud, indirectly data reside outside the organizational boundaries. This may cause users to lost control over their data and raises security problems that slow down the efficiency of Cloud computing. Data-centric access control approach with role-based expressiveness in which security is concentrated on protecting user data regardless the Cloud service provider who is responsible to store and manage data. Identity-based and proxy re-encryption techniques are used to Secure the authorization model. Data is in encrypted form and authorization rules are cryptographically protected to stored user data against the service provider access or misused. The authorization model provides very high expressiveness for datas with role hierarchies and resource hierarchical support. The solution takes advantage of the logic formalism provided by Semantic Web technologies, which make possible advanced rule management like semantic conflict detection. Real-time implementation has been developed and a working prototypical deployment of the proposal has been integrated within Google services.
Authors and Affiliations
Shila Ravte, Prof. Priti Subramanium
Novel Algorithm to Reduced Computational Data Sets for Fuzzy Association Rule
The Data Mining Association rule is suitable for small or medium scale data sets. For large data sets it becomes more complex because while applying association rule finding candidate and large item set again and again...
Survey on Personalized Web Search Engine
Search engines like bing, yahoo, google are very essential component in web existence. Internet engines are built for all kind of people and now not for any particular people. General web engines can't pick out the spec...
Increment in Lifetime of Wireless Sensor Networks Using Simulations in Load Balancing Routing Algorithm
In this paper we present a productive Load balancing routing system to expand the life time of every existing node in a manner to get most efficiency from the system. The current routing algorithms are used to pick a mi...
Investigations on the Flexural Strength and the Effect of b/h and l/b ratio on the Carbon Fiber Reinforced Epoxy Laminated Composites
In present day the use of fiber reinforced composites is increased remarkably in the various sectors of industries owing to its relative advantages especially in industries like aeronotics, automobile, ship building and...
Generation of Biogas energy and its uses
This paper deals with generation of biogas and its uses as a alternate source of energy . The primary elements of biogas are methane (CH4) and carbon dioxide (CO2) and may have small amount of hydrogen sulphide (H2S). b...