A Heuristic Approach for Encryption Policies in Data Outsourcing
Reads0
Chats0
TLDR
A heuristic approach is presented to convert an authorization policy into an equivalent encryption policy while minimizing the no of keys and tokens to be managed.Abstract:
In the era of globalization and dynamic world economies, data outsourcing is inevitable. Security is major concern in data outsourcing environment since data is under the custody of a third party service provider. In present systems DBAs of third party can access and view data even though they are not authorized to do so. This may lead to serious data theft and leakages causing severe business impact to data owner. There are certain many such cases occurred in financial and insurance sector. In this paper we have proposed a novel solution to overcome the problem by combining access control with encryption and digital signature of data. A heuristic approach is presented to convert an authorization policy into an equivalent encryption policy while minimizing the no of keys and tokens to be managed. Different policy enforcement can be applied to different dataset as per security and integrity requirement. General Terms Data Securityread more
Citations
More filters
Journal ArticleDOI
Rider Chicken Optimization Algorithm-Based Recurrent Neural Network for Big Data Classification in Spark Architecture
Vinoth R,Ananth J P +1 more
TL;DR: An effective classification method named Rider Chicken Optimization Algorithm-based Recurrent Neural Network (RCOA-based RNN) to perform big data classification in spark architecture is proposed to address the complex classification problems at a reasonable time.
References
More filters
Proceedings ArticleDOI
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
TL;DR: This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption.
Proceedings ArticleDOI
Providing database as a service
TL;DR: A novel paradigm for data management in which a third party service provider hosts "database as a service", providing its customers with seamless mechanisms to create, store, and access their databases at the host site is explored.
Journal ArticleDOI
Dynamic and Efficient Key Management for Access Hierarchies
TL;DR: The security of the scheme is based on pseudorandom functions, without reliance on the Random Oracle Model, and it is shown how to handle extensions proposed by Crampton [2003] of the standard hierarchies to “limited depth” and reverse inheritance.
Journal ArticleDOI
An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
Mackinnon,Taylor,Meijer,Akl +3 more
TL;DR: A cryptographic scheme for controlling access to information within a group of users organized in a hierarchy was proposed in [1].
Journal ArticleDOI
Refereed article: A cryptographic key generation scheme for multilevel data security
Lein Harn,Hung-Yu Lin +1 more
TL;DR: This paper presents a very similar approach to Akl and Taylor's scheme, but instead of using the top-down design approach, this scheme is using a bottom-up key generating procedure, which means that the published values for most security classes can be much smaller than in their scheme.
Related Papers (5)
A Review of Attribute based Encryption Technique for Security in Cloud Computing
Etti Mathur,Manish Sharma +1 more