Encryption techniques & access control models for data security: A survey

  • Authors

    • Rashmi Dixit
    • K. Ravindranath
    2017-12-31
    https://doi.org/10.14419/ijet.v7i1.5.9130
  • Encryption, Access controls Model, Confidentiality, Integrity, and Availability.
  • In the process of sending information from sender to receiver, an unauthorized user may work in an active way (update it) or passive way (read or delay in sending). There must be some techniques which assures receiver that whatever information received from authorized user as well as must be same as sent from sender side, in addition to this receiver never make Denial of service. Nowadays sharing of information or resources is a very common thing from single user to the network to the cloud. When information is moving from one node to another node, security is a big challenge. When information is stored on the user’s computer, it is under control but when it is in movement user lose control over it. In the world of security, to convert information from one form to another form, Encryption is used, so that only authorized party will able to read. Encryption is a technique for any security-conscious organization.In this paper, we present basic access control models along with encryption techniques.
  • References

    1. [1] Y.Zhang, J.Chen, R. Du. “Feacs: A flexible and Efficient access control scheme for cloud computingâ€2014

      [2] B.water “ciphertext –policy attribute-based encryption an expressive, efficient and provably secure realizationâ€2011

      [3] B.B, V.P “extensive survey on usage of attribute based encryption in cloudâ€2014

      [4] V.Goyal, O.Pande, A.Sahai, B. Water “Attribute based encryption for fine-grained access control of encrypted data†2016

      [5] D.R.Kuhn, E.J.Coyne, T.R.Weil “Adding Attributes to role based access controlâ€2010

      [6] G.Ateniese, K.Fu, M.Green, S.Hohenberger “Improved proxy re-encryption schemes with application to secure distributed storage†2006

      [7] F.Wang, Z.Liu,C.Wang†Full secure identity based encryption scheme with short public key size over lattices in the standard modelâ€2015

      [8] M.Green,G.Ateniese “Identity-based proxy re-encryptionâ€2007

      [9] G.Wang,Q.Liu,J.Wu “Hierarchical attribute-based encryption for fine-grained access control in cloud storage servicesâ€2010

      [10] J.Liu,Z. Wan,M.Gu “Hierarchical attribute-set based encryption for scalable ,flexible and fine-grained access control in cloud computingâ€2011.

      [11] Mohammed ENNAHBAOUI Said ELHAJJI “Study of Access Control Modelsâ€, Proceedings of the World Congress on Engineering 2013 Vol II, WCE 2013, July 3 - 5, 2013, London, U.K.

      [12] Juan M. Marın Perez, Gregorio Martınez Perez, Antonio F. Skarmeta Gomez “SecRBAC: Secure data in the Clouds†IEEE Transactions on Services Computing (Volume: 10, Issue: 5, Sept.-Oct. 1 2017).

      [13] Dr. Seetaiah Kilaru, Hari Kishore K, Sravani T, Anvesh Chowdary L, Balaji T “Review and Analysis of Promising Technologies with Respect to fifth Generation Networksâ€, 2014 First International Conference on Networks & Soft Computing, ISSN:978-1-4799-3486-7/14,pp.270-273,August2014.

  • Downloads

  • How to Cite

    Dixit, R., & Ravindranath, K. (2017). Encryption techniques & access control models for data security: A survey. International Journal of Engineering & Technology, 7(1.5), 107-110. https://doi.org/10.14419/ijet.v7i1.5.9130