CFP last date
20 May 2024
Reseach Article

A Review of Role based Encryption System for Secure Cloud Storage

by Avdhut Suryakant Bhise, Phursule R.n
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 109 - Number 14
Year of Publication: 2015
Authors: Avdhut Suryakant Bhise, Phursule R.n
10.5120/19255-0986

Avdhut Suryakant Bhise, Phursule R.n . A Review of Role based Encryption System for Secure Cloud Storage. International Journal of Computer Applications. 109, 14 ( January 2015), 15-20. DOI=10.5120/19255-0986

@article{ 10.5120/19255-0986,
author = { Avdhut Suryakant Bhise, Phursule R.n },
title = { A Review of Role based Encryption System for Secure Cloud Storage },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 109 },
number = { 14 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 15-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume109/number14/19255-0986/ },
doi = { 10.5120/19255-0986 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:45:10.681043+05:30
%A Avdhut Suryakant Bhise
%A Phursule R.n
%T A Review of Role based Encryption System for Secure Cloud Storage
%J International Journal of Computer Applications
%@ 0975-8887
%V 109
%N 14
%P 15-20
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There has been a growing trend to use the cloud for large-scale data storage. It has raised the important security issue of controlling and preventing any unauthorized access of data stored in the cloud. The role-based access control (RBAC) one of the well known access control model provides flexible controls and management by providing two mappings, one by mapping users to the roles and another by roles to the privileges on the data objects. In this we will discuss a role-based encryption (RBE) scheme that has been used previously with RBAC. A hybrid cloud storage of the RBE scheme architecture permits an organization to store data secure in a public cloud and maintains the private information related to the organizational structure in a private cloud. In this we will also focus on the models that are available in cloud computing.

References
  1. M. Armbrust, A. Fox, R. Grif?th, A. D. Joseph, R. H. Katz, A. Konwinski, et al. , "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50–58, 2010.
  2. L. Zhou, V. Varadharajan, and M. Hitchens, "Enforcing role-based access control for secure data storage in the cloud," Comput. J. , vol. 54, no. 13, pp. 1675–1687, Oct. 2011.
  3. Y. Zhu, H. Hu, G. -J. Ahn, H. Wang, and S. -B. Wang, "Provably secure role-based encryption with revocation mechanism," J. Comput. Sci. Technol. , vol. 26, no. 4, pp. 697–710,2011.
  4. S. G. Akl and P. D. Taylor, "Cryptographic solution to a problem of access control in a hierarchy," ACM Trans. Comput. Syst. , vol. 1, no. 3, pp. 239–248, 1983.
  5. H. R. Hassen, A. Bouabdallah, H. Bettahar, and Y. Challal, "Key management for content access control in a hierarchy," Comput. Netw. , vol. 51, no. 11, pp. 3197–3219, 2007.
  6. D. Ferraiolo and R. Kuhn. Role-Based Access Controls. In Proceedings of the 15th NIST-NCSC National Computer Security Conference, pages 554–563, Bultimore, Maryland, USA, October 1992.
  7. R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models. IEEE Computer,29(2):38–47, February 1996.
  8. D. Ferraiolo, R. Sandhu, S. Gavrila, R. Kuhn, and R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security, 4(3):224–274,August 2001.
  9. G. Edjlali, A. Acharya, and V. Chaudhary. History-based Access Control for Mobile Code. In Proceedings of the 5th ACM Conference on Computer and Communication Security (CCS'98), pages 38–48, San Francisco, California, USA, November 1998.
  10. M. Abadi and C. Fournet. Access control based on execution history. In Proceedings of NDSSS'03, pages 107–121, 2003.
  11. V. Goyal, O. Pandey, A. Sahai and B. Waters, "Attribute-based Encryption for Fine-Grained Access Control of Encrypted Data," Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89-98, 2006.
  12. R. Sandhu and X. Zhang. Peer-to-Peer Access Control Architecture Using Trusted Computing Technology. In Proceedings of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT'05), pages 147–158, Stockholm, Sweeden, June 2005.
  13. J. Bethencourt, A. Sahai and B. Waters, "Cipher text-Policy Attribute-Based Encryption," Proceedings of the IEEE Symposium on Security and Privacy, pp. 321-334, 2007.
  14. K. Yang and X. Jia, "Attribute-based Access Control for Multi-Authority Systems in Cloud Storage," Proceedings of the 32nd IEEE International Conference on Distributed Computing Systems, pp. 536-545, 2012.
  15. T. Ristenpart, E. Tromer, H. Shacham and S. Savage, "Hey, You, Get off my Cloud: Exploring Information Leakage in Third-Party Compute Clouds," Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 199-212, 2009.
  16. D. Nurmi, R. Wolski, C. Grzegorczyk, S. Soman, L. Youseff and D. Zagorodnov, "The Eucalyptus Open-Source Cloud-Computing System," Proceedings of the International Symposium on Cluster Computing and the Grid, pp. 124-131, 2009.
  17. B. Shafiq, J. B. D. Joshi, E. Bertino and A. Ghafoor, "Secure Interoperation in a Multi-domain Environment Employing RBAC Policies," IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 11, pp. 1557-1577, Nov. 2005.
  18. E. Bertino, P. A. Bonatti and E. Ferrari, "TRBAC: A Temporal Role-based Access Control Model," ACM Transactions on Information and System Security, vol. 4, no. 3, pp. 191-233, August 2001.
  19. J. B. D. Joshi, E. Bertino, U. Latif and A. Ghafoor, "A Generalized Temporal Role-Based Access Control Model," IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 1, pp. 4-23, January 2005.
  20. S. Tuecke, "Open Grid Services Infrastructure," pp. 1-86, www. ggf. org/documents/GFD. 15. pdf
  21. H. Jin, W. Qiang, X. Shia nd D. Zou, "RB-GACA: An RBAC Based Grid Access Control Architecture," International Journal of Grid and Utility Computing, vol. 1, no. 1, pp. 61-70, May 2005.
  22. Elisa Bertino, Piero Andrea Bonatti, and Elena Ferrari. 2000. TRBAC: a temporal role-based access control model. In Proceedings of the fifth ACM workshop on Role-based access control (RBAC '00). ACM, New York, NY, USA, 21-30. DOI=10. 1145/344287. 344298 http://doi. acm. org/10. 1145/344287. 3442
Index Terms

Computer Science
Information Sciences

Keywords

Role Based Access Control (RBAC) Role Based Encryption (RBE). Access Control Models Attribute-based Encryption Model Multi-tenancy Model.