DocumentCode
1997802
Title
Hierarchical identity role based proxy re-encryption scheme for cloud computing
Author
Nirmala, V. ; Shanmugalakshmi, R.
Author_Institution
Dept. of Comput. Sci. & Eng., Gov. Coll. of Technol., Coimbatore, India
fYear
2013
fDate
19-21 Dec. 2013
Firstpage
1
Lastpage
4
Abstract
Cloud computing offers customers resources for storing and computing when on-demand in pay-as-you-use manner. During storage, data owner need not want to maintain the local copy of the data. Instead, the “cloud” will maintain the data. In this scenario, it may be like data owner has less control on his data. In order to bring more control to data owner proper access control policies should be devised. Access control is a mechanism that provides prevention of unauthorized use of a resource. The policies will decide who can view the data and what action he is allowed to perform on the data. To overcome this, a hierarchical identity role based proxy re-encryption scheme has been adopted which allows a user to encrypt his data under his identity based on his role in his hierarchy to protect his data from leaking and, to delegate his data management capability to the cloud. This paper focuses on integration of hierarchical role identity with proxy re-encryption scheme to enhance the access control.
Keywords
authorisation; cloud computing; cryptography; cloud computing; data management capability; data owner proper access control policies; hierarchical identity role based proxy reencryption scheme; hierarchical role identity; Access control; Cloud computing; Encryption; Public key; Servers; Access Control; Attribute based Encryption; Cloud Computing; Cloud Security; Proxy Re-encryption;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Computing and Communication Systems (ICACCS), 2013 International Conference on
Conference_Location
Coimbatore
Type
conf
DOI
10.1109/ICACCS.2013.6938719
Filename
6938719
Link To Document