Confidential Data with Safeguard Access Control in distributed Cloud Computing

Kota Anusha, K L V G K Murthy

Abstract


Cloud computing is a safeguard technology which means that privileging permissions for the users   and stowing of data on world wide web. Mainly cloud computing focus on Protection and mystery represent major concerns in the acceptance of cloud technologies for data insertions . A major issue  is how to safe access control policies such that 2 layer encryption can be achieved internally. Solve  these problem by using this proposed in the decentralization process in two layer broadcast encryption schema, by eliminate the group manager preliminary unit of the set, with an advantage of the addition of supporting members to the coordination, does not want any central authorization. Our model is represent AES method for secrecy data management purpose and it will provide accuracy data for authorised person only .That person get main key for access the data this key will be produced by key generation algorithm. In this we are having like search engine. This engine defends on cloud previous engines not provide accurate info and also previous technologies provides inaccurate info and secure data retrieved unauthorised also.    Our coordination assures the confidentiality of the data and preserves the privacy of users from the cloud although delegating most of the access power enforcement to the cloud. Existing market inclination need Products to be developed at elevated swiftness. To meet those requirements sometimes it requires collaboration between the organizations. Since of the proficient services that are being obtainable by the cloud service providers today, lots of business organizations started compelling advantage of cloud services. Specifically, Cloud computing enables a new form of service in that a service can be realized by components provided by different enterprises or entities in a collaborative manner. Contributing parties are commonly loosely connected and they are responsible for managing and protecting resources/data consign to them. Such situation demands advanced and modern mechanisms for better security and privacy protection of data shared among multiple participating parties. In this, we are presented access control policy. This policy is included priveligation function and accurate info function. Our contribution is mainly focus on assures the confidentiality of the data and preserves the privacy of users.


References


X. Zhang, S. Oh and R. Sandhu, “PBDM: a flexible delegation model n RBAC,” In proceedings of the eighth ACM symposium on Access control models and technologies (SACMAT), New York, NY, USA, pp. 149–157, 2003.

M. Moniruzzaman, M.S. Ferdous and R. Hossain, “A study of privacy policy enforcement in access control models,” In proceedings of 13th International Conference on Computer and Information Technology (ICCIT). Dhaka, Bangladesh, pp. 352 – 357, 2010. DOI:10.1109/ICCITECHN.2010.5723883.

M. Jafari, P. W. L. Fong, R. Safavi-Naini, K. Barker, and N. P. Sheppard, “Towards Defining Semantic Foundations for Purpose- Based Privacy Policies,” In proceedings of the First ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, Taxas, USA, 213-224, 2011.

N. Shang, M. Nabeel, F. Paci, and E. Bertino, “A privacy-preserving approach to policy-based content dissemination,” in ICDE ’10: Proceedings of the 2010 IEEE 26th International Conference on Data Engineering, 2010.

Thuraisingham, “Towards privacy preserving access control in the cloud,” in Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Work-sharing, ser. Collaborate Com ’11, 2011, pp. 172–180.

M.Nabeel, N.Shang, and E.Bertino, “Privacy preserving policy based content sharing in public clouds,” IEEE Transactions on Knowledge and Data Engineering, 2012.

Cecile Delerablee, Pascal Paillier, and David Point cheval. Fully collusion secure dynamic broadcast encryption with constant-size cipher texts or decryption keys. In T. Takagi et al., editor, Pairing 2007, volume 4575 of LNCS, pages 39-59. Springer, 2007.


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.