Securing Data Using Role Based Access Control for Data Centric Approach

Abstract

Currently all security arrangements are based on perimeter security. However, Use of cloud computing breaks the organization borders. When organisational data stored on the Cloud, indirectly data reside outside the organizational boundaries. This may cause users to lost control over their data and raises security problems that slow down the efficiency of Cloud computing. Data-centric access control approach with role-based expressiveness in which security is concentrated on protecting user data regardless the Cloud service provider who is responsible to store and manage data. Identity-based and proxy re-encryption techniques are used to Secure the authorization model. Data is in encrypted form and authorization rules are cryptographically protected to stored user data against the service provider access or misused. The authorization model provides very high expressiveness for datas with role hierarchies and resource hierarchical support. The solution takes advantage of the logic formalism provided by Semantic Web technologies, which make possible advanced rule management like semantic conflict detection. Real-time implementation has been developed and a working prototypical deployment of the proposal has been integrated within Google services.

Authors and Affiliations

Shila Ravte, Prof. Priti Subramanium

Keywords

Related Articles

Automatic Railway System Using Wireless Sensor Network

This paper is analysis for the crucial situation occurs in the automatic train system. In the railway surveying in many accidents cause multiple damage for life and also our property. So that this project to implement i...

The Relationship between Granite Stones and Lung Cancer in Iranian homes kitchen (Case Study: City of Hamedan)

Radon is a radioactive noble gas that can be produced from the decay of radium and detected by special devices. In the air, radon compounds stick to the dust particles and other suspended particles and enter into the hu...

Automobile A.C. By Utilizing Exhaust Gases

Energy efficiency has been a major topic of discussions on natural resources preservation and costs reduction. Based on estimates of energy resources reduction at medium and long terms, internal combustion engines are p...

MOM A Substitute to Your MOM

Mom is an engineering solution that is a combination of both hardware and software, it consist of a simple circuit that enables the user to search for essentialities that are misplaced in his everyday life ,consuming hi...

A survey to maximize retransmission of packets in WMSN

It has been a center of research in a wide variety of areas including digital signal processing, communication, networking and control systems. Wireless multimedia sensor networks (WMSN)[1] consist of minute camera node...

Download PDF file
  • EP ID EP24463
  • DOI -
  • Views 351
  • Downloads 11

How To Cite

Shila Ravte, Prof. Priti Subramanium (2017). Securing Data Using Role Based Access Control for Data Centric Approach. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(6), -. https://europub.co.uk/articles/-A-24463