Critique of Some Fine-Grained Access Control Models in Cloud Computing Environment

K. Dhal, P. Pattnaik, S. C. Rai
{"title":"Critique of Some Fine-Grained Access Control Models in Cloud Computing Environment","authors":"K. Dhal, P. Pattnaik, S. C. Rai","doi":"10.1109/ICIT.2016.050","DOIUrl":null,"url":null,"abstract":"Cloud computing is an emerging computing tool in which resources accessed as a service over Internet on pay for use basis. Most of the service providers are changing their server storage to cloud storage. It is a great challenge for the service provider to attract the customers to store their sensitive data/file in the cloud storage. Service provisioning with respect to privacy preservation and data security is an area of concern. In general the cloud servers are being deployed on different trusted domain by different data owner. There will be need to encrypt sensitive data and store them in cloud server and disclose decryption key to authorized users. But drawback of this method is that owner of file can selectively share data by sharing his private key. Most of the computation for key distribution and management are done by the data owner. T here are various fine-grained access control models for sharing of encrypted data on cloud server. Some of these model used key policy Attribute Based Encryption (KP-ABE) and others used Cipher text Policy Attribute Based Encryption (CP-ABE). These techniques can be used to keep shared data confidential even if data is stored on remote server. These models are used to define and enforcing access control policy based on attributes and delegates most of the computation task involved in fine grained access control without disclosing data to storage server. This paper under takes critical study on available access control approaches that has been deployed in cloud computing environment.","PeriodicalId":220153,"journal":{"name":"2016 International Conference on Information Technology (ICIT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Information Technology (ICIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIT.2016.050","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Cloud computing is an emerging computing tool in which resources accessed as a service over Internet on pay for use basis. Most of the service providers are changing their server storage to cloud storage. It is a great challenge for the service provider to attract the customers to store their sensitive data/file in the cloud storage. Service provisioning with respect to privacy preservation and data security is an area of concern. In general the cloud servers are being deployed on different trusted domain by different data owner. There will be need to encrypt sensitive data and store them in cloud server and disclose decryption key to authorized users. But drawback of this method is that owner of file can selectively share data by sharing his private key. Most of the computation for key distribution and management are done by the data owner. T here are various fine-grained access control models for sharing of encrypted data on cloud server. Some of these model used key policy Attribute Based Encryption (KP-ABE) and others used Cipher text Policy Attribute Based Encryption (CP-ABE). These techniques can be used to keep shared data confidential even if data is stored on remote server. These models are used to define and enforcing access control policy based on attributes and delegates most of the computation task involved in fine grained access control without disclosing data to storage server. This paper under takes critical study on available access control approaches that has been deployed in cloud computing environment.
云计算环境下一些细粒度访问控制模型的批判
云计算是一种新兴的计算工具,在这种工具中,资源作为一种服务在互联网上按使用付费访问。大多数服务提供商正在将其服务器存储更改为云存储。如何吸引客户将其敏感数据/文件存储在云存储中,对服务提供商来说是一个巨大的挑战。与隐私保护和数据安全相关的服务提供是一个值得关注的领域。通常,云服务器由不同的数据所有者部署在不同的可信域中。将需要加密敏感数据并将其存储在云服务器中,并向授权用户披露解密密钥。但是这种方法的缺点是文件的所有者可以通过共享他的私钥有选择地共享数据。密钥分发和管理的大部分计算都由数据所有者完成。这里有用于共享云服务器上加密数据的各种细粒度访问控制模型。其中一些模型使用基于密钥策略属性的加密(KP-ABE),另一些模型使用基于密文策略属性的加密(CP-ABE)。这些技术可用于保持共享数据的机密性,即使数据存储在远程服务器上。这些模型用于定义和实施基于属性的访问控制策略,并将细粒度访问控制中涉及的大部分计算任务委托给存储服务器,而不向存储服务器泄露数据。本文对云计算环境中可用的访问控制方法进行了重点研究。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信