Title :
Hierarchical identity role based proxy re-encryption scheme for cloud computing
Author :
Nirmala, V. ; Shanmugalakshmi, R.
Author_Institution :
Dept. of Comput. Sci. & Eng., Gov. Coll. of Technol., Coimbatore, India
Abstract :
Cloud computing offers customers resources for storing and computing when on-demand in pay-as-you-use manner. During storage, data owner need not want to maintain the local copy of the data. Instead, the “cloud” will maintain the data. In this scenario, it may be like data owner has less control on his data. In order to bring more control to data owner proper access control policies should be devised. Access control is a mechanism that provides prevention of unauthorized use of a resource. The policies will decide who can view the data and what action he is allowed to perform on the data. To overcome this, a hierarchical identity role based proxy re-encryption scheme has been adopted which allows a user to encrypt his data under his identity based on his role in his hierarchy to protect his data from leaking and, to delegate his data management capability to the cloud. This paper focuses on integration of hierarchical role identity with proxy re-encryption scheme to enhance the access control.
Keywords :
authorisation; cloud computing; cryptography; cloud computing; data management capability; data owner proper access control policies; hierarchical identity role based proxy reencryption scheme; hierarchical role identity; Access control; Cloud computing; Encryption; Public key; Servers; Access Control; Attribute based Encryption; Cloud Computing; Cloud Security; Proxy Re-encryption;
Conference_Titel :
Advanced Computing and Communication Systems (ICACCS), 2013 International Conference on
Conference_Location :
Coimbatore
DOI :
10.1109/ICACCS.2013.6938719