Enforcing Multi-user Security Policies in Cloud Computing

Abstract

The user can access data from any server with unlimited data with the security. Multi-user tendency will cost lesser than the expected cost in the single user environment. While dealing with cloud computing, confidential data can be secured from the unauthorized access and internal threats. Cloud servers use smart techniques for achieving this requirement like encryption and decryption of data. The database is stored in the encrypted format on the server & a complex query can be fired on it. Cloud server will maintain the access control policies to reveal the data from the database that are in the encrypted format. In the access control policies, we use KMA (Key Management Authority) which provides the keyset for encryption & decryption of the database. The attributes entered by the user will create one public key which is cipher text based. So this technique is called as cipher text based technique. This key is used for encryption. While registering, user will choose the policy and select the attributes on which security policy is based. Because of this it is called as cipher text policy attribute based encryption (CP-ABE). To achieve this complex encryption, we can use many algorithms like AES or DES encryption algorithms with CPABE algorithm. This scheme allows making SQL-like queries on encrypted database in multiuser environment while at the same time, the database owner assign different access rights to users that defines a specific policy for the database. The major use of this encryption is privacy, access control and data confidentiality and multi-user access control.

Authors and Affiliations

Mrs. Shubhada P. Mone , Mrs. Sunita S. Dhotre

Keywords

Related Articles

Model Based Test Case Generation From Natural Language Requirements And Inconsistency, Incompleteness Detection in Natural Language Using Model-Checking Approach

Natural language (NL) is any language that arises in an unpremeditated fashion as the result of the innate facility for language possessed by the human intellect. A natural language is typically used for communication, a...

Performance Enhancement of Data Communication through Visible Light Communication Using On Off Keying 

Visible Light Communication (VLC) refers to short-range optical wireless communication using visible light spectrum from 380 to 780nm and it has many advantages such as it can offer speeds up to 10GB/S. The other a...

GA optimized SVD based signal detector for Cognitive radio Networks 

This paper examines the implementation of the Genetic Algorithm (GA) optimized Singular Value Decomposition (SVD) method to detect the presence of wireless signal. We simulated the algorithm using common digital...

Evaluating QOSMOS Using Markov Decision Process Model  

Service discovery has been recognized as an important aspect in the development of service centric systems, i.e., software systems which deploy web services. To develop such systems, it is necessary to identify ser...

Enhancer- A Time Commit Protocol 

This paper contains content with the investigating the performance implications of providing transaction atomicity for a deadline real time applications operating on distributed data. Considering all the commit p...

Download PDF file
  • EP ID EP93546
  • DOI -
  • Views 73
  • Downloads 0

How To Cite

Mrs. Shubhada P. Mone, Mrs. Sunita S. Dhotre (2013). Enforcing Multi-user Security Policies in Cloud Computing. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(5), 1784-1788. https://europub.co.uk/articles/-A-93546