The document presents a data-centric access control solution for securing cloud data, addressing concerns over user control and security amidst cloud computing. It introduces enriched role-based expressiveness and employs cryptographic techniques, including identity-based and proxy re-encryption, to protect authorization models and user data from service provider access. A proof of concept has been implemented, showcasing advanced rule management and conflict detection through semantic web technologies.
Related topics: