scispace - formally typeset
Open AccessJournal ArticleDOI

A Heuristic Approach for Encryption Policies in Data Outsourcing

Reads0
Chats0
TLDR
A heuristic approach is presented to convert an authorization policy into an equivalent encryption policy while minimizing the no of keys and tokens to be managed.
Abstract
In the era of globalization and dynamic world economies, data outsourcing is inevitable. Security is major concern in data outsourcing environment since data is under the custody of a third party service provider. In present systems DBAs of third party can access and view data even though they are not authorized to do so. This may lead to serious data theft and leakages causing severe business impact to data owner. There are certain many such cases occurred in financial and insurance sector. In this paper we have proposed a novel solution to overcome the problem by combining access control with encryption and digital signature of data. A heuristic approach is presented to convert an authorization policy into an equivalent encryption policy while minimizing the no of keys and tokens to be managed. Different policy enforcement can be applied to different dataset as per security and integrity requirement. General Terms Data Security

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Rider Chicken Optimization Algorithm-Based Recurrent Neural Network for Big Data Classification in Spark Architecture

TL;DR: An effective classification method named Rider Chicken Optimization Algorithm-based Recurrent Neural Network (RCOA-based RNN) to perform big data classification in spark architecture is proposed to address the complex classification problems at a reasonable time.
References
More filters
Proceedings ArticleDOI

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

TL;DR: This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption.
Proceedings ArticleDOI

Providing database as a service

TL;DR: A novel paradigm for data management in which a third party service provider hosts "database as a service", providing its customers with seamless mechanisms to create, store, and access their databases at the host site is explored.
Journal ArticleDOI

Dynamic and Efficient Key Management for Access Hierarchies

TL;DR: The security of the scheme is based on pseudorandom functions, without reliance on the Random Oracle Model, and it is shown how to handle extensions proposed by Crampton [2003] of the standard hierarchies to “limited depth” and reverse inheritance.
Journal ArticleDOI

An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy

TL;DR: A cryptographic scheme for controlling access to information within a group of users organized in a hierarchy was proposed in [1].
Journal ArticleDOI

Refereed article: A cryptographic key generation scheme for multilevel data security

TL;DR: This paper presents a very similar approach to Akl and Taylor's scheme, but instead of using the top-down design approach, this scheme is using a bottom-up key generating procedure, which means that the published values for most security classes can be much smaller than in their scheme.
Related Papers (5)