Contact Project Developer Ashish D. Tiwari [astiwz@gmail.com]
Download Synopsis Abstract
Mobile Apps Java Android BE-Engineering(CO/IT) ME-Engineering(CO/IT) BCS MCS BCA MCA MCM BSC Computer/IT MSC Computer/IT BE E&TC / ECE Diploma (CO/IT) IEEE-2016 Security

SecRBAC:Secure Data in Clouds

Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters.
Abstract-Synopsis-Documentation

SecRBAC:Secure Data in Clouds.

Abstract

Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loos of control over their data and raises reasonable security concerns that slow down the adoption of Cloud computing. Is the Cloud service provider accessing the data? Is it legitimately applying the access control policy defined by the user? This paper presents a data-centric access control solution with enriched role-based expressiveness in which security is focused on protecting user data regardless the Cloud service provider that holds it. Novel identity-based and proxy re-encryption techniques are used to protect the authorization model. Data is encrypted and authorization rules are cryptographically protected to preserve user data against the service provider access or misbehavior. The authorization model provides high expressiveness with role hierarchy and resource hierarchy support. The solution takes advantage of the logic formalism provided by Semantic Web technologies, which enables advanced rule management like semantic conflict detection. A proof of concept implementation has been developed and a working prototypical deployment of the proposal has been integrated within Google services.

4.Data-Centric Solution For Data Protection In The Cloud


An architecture is also proposed for the deployment within a CSPs. This architecture takes into consideration the different elements that should be deployed in order to give an overview of how access to protected data is done in this approach.


Comment is Only Available for registered users! Create Account or Login Now!