Encryption techniques & access control models for data security: A survey

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    In the process of sending information from sender to receiver, an unauthorized user may work in an active way (update it) or passive way (read or delay in sending). There must be some techniques which assures receiver that whatever information received from authorized user as well as must be same as sent from sender side, in addition to this receiver never make Denial of service. Nowadays sharing of information or resources is a very common thing from single user to the network to the cloud. When information is moving from one node to another node, security is a big challenge. When information is stored on the user’s computer, it is under control but when it is in movement user lose control over it. In the world of security, to convert information from one form to another form, Encryption is used, so that only authorized party will able to read. Encryption is a technique for any security-conscious organization.In this paper, we present basic access control models along with encryption techniques.

  • Keywords

    Encryption, Access controls Model, Confidentiality, Integrity, and Availability.

  • References

      [1] Y.Zhang, J.Chen, R. Du. “Feacs: A flexible and Efficient access control scheme for cloud computing”2014

      [2] B.water “ciphertext –policy attribute-based encryption an expressive, efficient and provably secure realization”2011

      [3] B.B, V.P “extensive survey on usage of attribute based encryption in cloud”2014

      [4] V.Goyal, O.Pande, A.Sahai, B. Water “Attribute based encryption for fine-grained access control of encrypted data” 2016

      [5] D.R.Kuhn, E.J.Coyne, T.R.Weil “Adding Attributes to role based access control”2010

      [6] G.Ateniese, K.Fu, M.Green, S.Hohenberger “Improved proxy re-encryption schemes with application to secure distributed storage” 2006

      [7] F.Wang, Z.Liu,C.Wang” Full secure identity based encryption scheme with short public key size over lattices in the standard model”2015

      [8] M.Green,G.Ateniese “Identity-based proxy re-encryption”2007

      [9] G.Wang,Q.Liu,J.Wu “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services”2010

      [10] J.Liu,Z. Wan,M.Gu “Hierarchical attribute-set based encryption for scalable ,flexible and fine-grained access control in cloud computing”2011.

      [11] Mohammed ENNAHBAOUI Said ELHAJJI “Study of Access Control Models”, Proceedings of the World Congress on Engineering 2013 Vol II, WCE 2013, July 3 - 5, 2013, London, U.K.

      [12] Juan M. Marın Perez, Gregorio Martınez Perez, Antonio F. Skarmeta Gomez “SecRBAC: Secure data in the Clouds” IEEE Transactions on Services Computing (Volume: 10, Issue: 5, Sept.-Oct. 1 2017).

      [13] Dr. Seetaiah Kilaru, Hari Kishore K, Sravani T, Anvesh Chowdary L, Balaji T “Review and Analysis of Promising Technologies with Respect to fifth Generation Networks”, 2014 First International Conference on Networks & Soft Computing, ISSN:978-1-4799-3486-7/14,pp.270-273,August2014.




Article ID: 9130
DOI: 10.14419/ijet.v7i1.5.9130

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.