SlideShare a Scribd company logo
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
SecRBAC: Secure data in the Clouds
ABSTRACT:
Most current security solutions are based on perimeter security. However,
Cloud computing breaks the organization perimeters. When data resides in the
Cloud, they reside outside the organizational bounds. This leads users to a loos
of control over their data and raises reasonable security concerns that slow
down the adoption of Cloud computing. Is the Cloud service provider accessing
the data? Is it legitimately applying the access control policy defined by the
user? This paper presents a data-centric access control solution with enriched
role-based expressiveness in which security is focused on protecting user data
regardless the Cloud service provider that holds it. Novel identity-based and
proxy re-encryption techniques are used to protect the authorization model.
Data is encrypted and authorization rules are cryptographically protected to
preserve user data against the service provider access or misbehavior. The
authorization model provides high expressiveness with role hierarchy and
resource hierarchy support. The solution takes advantage of the logic
formalism provided by Semantic Web technologies, which enables advanced
rule management like semantic conflict detection. A proof of concept
implementation has been developed and a working prototypical deployment
of the proposal has been integrated within Google services.
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
CONCLUSION
A data-centric authorization solution has been proposed for the secure
protection of data in the Cloud. SecRBAC allows managing authorization
following a rule-based approach and provides enriched role-based
expressiveness including role and object hierarchies. Access control
computations are delegated to the CSP, being this not only unable to access
the data, but also unable to release it to unauthorized parties. Advanced
cryptographic techniques have been applied to protect the authorization
model. A re-encryption key complements each authorization rule as
cryptographic token to protect data against CSP misbehavior. The solution is
independent of any PRE scheme or implementation as far as three specific
features are supported. A concrete IBPRE scheme has been used in this paper
in order to provide a comprehensive and feasible solution. A proposal based on
Semantic Web technologies has been exposed for the representation and
evaluation of the authorization model. It makes use of the semantic features of
ontologies and the computational capabilities of reasoners to specify and
evaluate the model. This also enables the application of advanced techniques
such as conflict detection and resolution methods. Guidelines for deployment
in a Cloud Service Provider have been also given, including an hybrid approach
compatible with Public Key Cryptography that enables the usage of standard
PKI for key management and distribution. A prototypical implementation of
the proposal has been also developed and exposed in this paper, together with
some experimental results. Future lines of research include the analysis of
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
novel cryptographic techniques that could enable the secure modification and
deletion of data in the Cloud. This would allow to extend the privileges of the
authorization model with more actions like modify and delete. Another
interesting point is the obfuscation of the authorization model for privacy
reasons. Although the usage of pseudonyms is proposed, but more advanced
obfuscation techniques can be researched to achieve a higher level of privacy.
REFERENCES
[1] Cloud Security Alliance, “Security guidance for critical areas of focus in
cloud computing v3.0,” CSA, Tech. Rep., 2003.
[2] Y. Zhang, J. Chen, R. Du, L. Deng, Y. Xiang, and Q. Zhou, “Feacs: A flexible
and efficient access control scheme for cloud computing,” in Trust, Security
and Privacy in Computing and Communications, 2014 IEEE 13th International
Conference on, Sept 2014, pp. 310–319.
[3] B. Waters, “Ciphertext-policy attribute-based encryption: An expressive,
efficient, and provably secure realization,” in Public Key Cryptography - PKC
2011, 2011, vol. 6571, pp. 53–70.
[4] B. B and V. P, “Extensive survey on usage of attribute based encryption in
cloud,” Journal of Emerging Technologies in Web Intelligence, vol. 6, no. 3,
2014.
[5] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption
for fine-grained access control of encrypted data,” in Proceedings of the 13th
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
ACM Conference on Computer and Communications Security, ser. CCS ’06,
New York, NY, USA, 2006, pp. 89–98.
[6] InterNational Committee for Information Technology Standards, “INCITS
494-2012 - information technology - role based access control - policy
enhanced,” INCITS, Standard, Jul. 2012.
[7] E. Coyne and T. R. Weil, “Abac and rbac: Scalable, flexible, and auditable
access management,” IT Professional, vol. 15, no. 3, pp. 14–16, 2013.
[8] Empower ID, “Best practices in enterprise authorization: The RBAC/ABAC
hybrid approach,” Empower ID, White paper, 2013.
[9] D. R. Kuhn, E. J. Coyne, and T. R. Weil, “Adding attributes to rolebased
access control,” Computer, vol. 43, no. 6, pp. 79–81, 2010.
[10] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-
encryption schemes with applications to secure distributed storage,” ACM
Transactions on Information and System Security, vol. 9, no. 1, pp. 1–30, 2006.
[11] F. Wang, Z. Liu, and C. Wang, “Full secure identity-based encryption
scheme with short public key size over lattices in the standard model,” Intl.
Journal of Computer Mathematics, pp. 1–10, 2015.
[12] M. Green and G. Ateniese, “Identity-based proxy re-encryption,” in
Proceedings of the 5th International Conference on Applied Cryptography and
Network Security, ser. ACNS ’07. Berlin, Heidelberg: Springer-Verlag, 2007, pp.
288–306. [
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com

More Related Content

PPTX
Data storage security in cloud computing
PPTX
Ensuring data storage security in cloud computing
PDF
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
PPTX
Ensuring data security in cloud computing. - Anusha Tuke
PDF
Evaluation Of The Data Security Methods In Cloud Computing Environments
PDF
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
PDF
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
PPTX
Cloud Encryption
Data storage security in cloud computing
Ensuring data storage security in cloud computing
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
Ensuring data security in cloud computing. - Anusha Tuke
Evaluation Of The Data Security Methods In Cloud Computing Environments
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Cloud Encryption

What's hot (20)

PPTX
Security in cloud computing
PPTX
Data Security Essentials for Cloud Computing - JavaOne 2013
PPT
PPT
Security Issues of Cloud Computing
PDF
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
PPTX
Data security using rsa
PPTX
Ryan_Holt_MS_Thesis_Project_Presentation
PPT
security Issues of cloud computing
PPT
Attaining data security in cloud computing
PPTX
Cloud Computing Security Issues
PPT
Secure Data Sharing in Cloud (SDSC)
PPTX
Security in cloud computing
PPT
Security Problem With Cloud Computing
PPTX
Security issues in cloud database
PDF
Cloud computing security
PPTX
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
PDF
Data protection in cloud computing - Data Protection Conference 2011
PPT
On technical security issues in cloud computing
PPTX
Data Integrity proofs in cloud storage
PPTX
data storage security technique for cloud computing
Security in cloud computing
Data Security Essentials for Cloud Computing - JavaOne 2013
Security Issues of Cloud Computing
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Data security using rsa
Ryan_Holt_MS_Thesis_Project_Presentation
security Issues of cloud computing
Attaining data security in cloud computing
Cloud Computing Security Issues
Secure Data Sharing in Cloud (SDSC)
Security in cloud computing
Security Problem With Cloud Computing
Security issues in cloud database
Cloud computing security
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Data protection in cloud computing - Data Protection Conference 2011
On technical security issues in cloud computing
Data Integrity proofs in cloud storage
data storage security technique for cloud computing
Ad

Viewers also liked (20)

PPTX
Cloud security ppt
PPTX
Data security in cloud computing
DOCX
A profit maximization scheme with guaranteed
PPTX
17 exceptions
PPTX
02 what is java
PPTX
Desgn&imp authentctn.ppt by Jaseela
PDF
Generation of cda xml schema from dicom images using hl7 standard 2
PPTX
Attribute based encryption in cloud with significant reduction reviw2
PPTX
Healthcare Exchange Interoperability
PDF
Conditional identity based broadcast proxy re-encryption and its application ...
PDF
Duplicate detection
PDF
A study and survey on various progressive duplicate detection mechanisms
PPTX
Understanding clinical data exchange and cda (hl7 201)
PDF
HL7 & Health Information Exchange in Thailand
PDF
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
PDF
SecureCloud Project
PDF
Tutorial 4 (duplicate detection)
PPTX
Datamining
PDF
Progressive duplicate detection
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
Cloud security ppt
Data security in cloud computing
A profit maximization scheme with guaranteed
17 exceptions
02 what is java
Desgn&imp authentctn.ppt by Jaseela
Generation of cda xml schema from dicom images using hl7 standard 2
Attribute based encryption in cloud with significant reduction reviw2
Healthcare Exchange Interoperability
Conditional identity based broadcast proxy re-encryption and its application ...
Duplicate detection
A study and survey on various progressive duplicate detection mechanisms
Understanding clinical data exchange and cda (hl7 201)
HL7 & Health Information Exchange in Thailand
Secure Cloud - Secure Big Data Processing in Untrusted Clouds
SecureCloud Project
Tutorial 4 (duplicate detection)
Datamining
Progressive duplicate detection
Attribute Based Encryption with Privacy Preserving In Clouds
Ad

Similar to SecRBAC: Secure data in the Clouds (20)

PDF
A Survey on Different Techniques Used in Decentralized Cloud Computing
PDF
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
PDF
Ijarcet vol-2-issue-3-942-946
PDF
Analysis of classical encryption techniques in cloud computing
PDF
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
PDF
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
PDF
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
PDF
Cloud Computing Environment using Secured Access Control Technique
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
A Secure & Scalable Access Method in Cloud Computing
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
PDF
Design of access control framework for big data as a service platform
PDF
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
PDF
R180203114117
PDF
Ieeepro techno solutions 2011 ieee java project -secure role based data
PDF
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
PDF
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
PDF
1784 1788
PDF
1784 1788
PDF
IRJET- Two ways Verification for Securing Cloud Data
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Ijarcet vol-2-issue-3-942-946
Analysis of classical encryption techniques in cloud computing
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
Cloud Computing Environment using Secured Access Control Technique
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
A Secure & Scalable Access Method in Cloud Computing
Two Aspect Validation Control Frameworks for Online Distributed Services
Design of access control framework for big data as a service platform
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
R180203114117
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
1784 1788
1784 1788
IRJET- Two ways Verification for Securing Cloud Data

More from Nexgen Technology (20)

DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
DOCX
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
DOCX
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
DOCX
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
DOCX
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
DOCX
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
DOCX
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
DOCX
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
DOCX
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
DOCX
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...

Recently uploaded (20)

PDF
Updated Idioms and Phrasal Verbs in English subject
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Cell Structure & Organelles in detailed.
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
Updated Idioms and Phrasal Verbs in English subject
Final Presentation General Medicine 03-08-2024.pptx
Final Presentation General Medicine 03-08-2024.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Microbial disease of the cardiovascular and lymphatic systems
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Supply Chain Operations Speaking Notes -ICLT Program
Weekly quiz Compilation Jan -July 25.pdf
Orientation - ARALprogram of Deped to the Parents.pptx
Cell Structure & Organelles in detailed.
UNIT III MENTAL HEALTH NURSING ASSESSMENT
What if we spent less time fighting change, and more time building what’s rig...
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Practical Manual AGRO-233 Principles and Practices of Natural Farming
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
LDMMIA Reiki Yoga Finals Review Spring Summer

SecRBAC: Secure data in the Clouds

  • 1. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com SecRBAC: Secure data in the Clouds ABSTRACT: Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loos of control over their data and raises reasonable security concerns that slow down the adoption of Cloud computing. Is the Cloud service provider accessing the data? Is it legitimately applying the access control policy defined by the user? This paper presents a data-centric access control solution with enriched role-based expressiveness in which security is focused on protecting user data regardless the Cloud service provider that holds it. Novel identity-based and proxy re-encryption techniques are used to protect the authorization model. Data is encrypted and authorization rules are cryptographically protected to preserve user data against the service provider access or misbehavior. The authorization model provides high expressiveness with role hierarchy and resource hierarchy support. The solution takes advantage of the logic formalism provided by Semantic Web technologies, which enables advanced rule management like semantic conflict detection. A proof of concept implementation has been developed and a working prototypical deployment of the proposal has been integrated within Google services.
  • 2. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com CONCLUSION A data-centric authorization solution has been proposed for the secure protection of data in the Cloud. SecRBAC allows managing authorization following a rule-based approach and provides enriched role-based expressiveness including role and object hierarchies. Access control computations are delegated to the CSP, being this not only unable to access the data, but also unable to release it to unauthorized parties. Advanced cryptographic techniques have been applied to protect the authorization model. A re-encryption key complements each authorization rule as cryptographic token to protect data against CSP misbehavior. The solution is independent of any PRE scheme or implementation as far as three specific features are supported. A concrete IBPRE scheme has been used in this paper in order to provide a comprehensive and feasible solution. A proposal based on Semantic Web technologies has been exposed for the representation and evaluation of the authorization model. It makes use of the semantic features of ontologies and the computational capabilities of reasoners to specify and evaluate the model. This also enables the application of advanced techniques such as conflict detection and resolution methods. Guidelines for deployment in a Cloud Service Provider have been also given, including an hybrid approach compatible with Public Key Cryptography that enables the usage of standard PKI for key management and distribution. A prototypical implementation of the proposal has been also developed and exposed in this paper, together with some experimental results. Future lines of research include the analysis of
  • 3. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com novel cryptographic techniques that could enable the secure modification and deletion of data in the Cloud. This would allow to extend the privileges of the authorization model with more actions like modify and delete. Another interesting point is the obfuscation of the authorization model for privacy reasons. Although the usage of pseudonyms is proposed, but more advanced obfuscation techniques can be researched to achieve a higher level of privacy. REFERENCES [1] Cloud Security Alliance, “Security guidance for critical areas of focus in cloud computing v3.0,” CSA, Tech. Rep., 2003. [2] Y. Zhang, J. Chen, R. Du, L. Deng, Y. Xiang, and Q. Zhou, “Feacs: A flexible and efficient access control scheme for cloud computing,” in Trust, Security and Privacy in Computing and Communications, 2014 IEEE 13th International Conference on, Sept 2014, pp. 310–319. [3] B. Waters, “Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization,” in Public Key Cryptography - PKC 2011, 2011, vol. 6571, pp. 53–70. [4] B. B and V. P, “Extensive survey on usage of attribute based encryption in cloud,” Journal of Emerging Technologies in Web Intelligence, vol. 6, no. 3, 2014. [5] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th
  • 4. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com ACM Conference on Computer and Communications Security, ser. CCS ’06, New York, NY, USA, 2006, pp. 89–98. [6] InterNational Committee for Information Technology Standards, “INCITS 494-2012 - information technology - role based access control - policy enhanced,” INCITS, Standard, Jul. 2012. [7] E. Coyne and T. R. Weil, “Abac and rbac: Scalable, flexible, and auditable access management,” IT Professional, vol. 15, no. 3, pp. 14–16, 2013. [8] Empower ID, “Best practices in enterprise authorization: The RBAC/ABAC hybrid approach,” Empower ID, White paper, 2013. [9] D. R. Kuhn, E. J. Coyne, and T. R. Weil, “Adding attributes to rolebased access control,” Computer, vol. 43, no. 6, pp. 79–81, 2010. [10] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re- encryption schemes with applications to secure distributed storage,” ACM Transactions on Information and System Security, vol. 9, no. 1, pp. 1–30, 2006. [11] F. Wang, Z. Liu, and C. Wang, “Full secure identity-based encryption scheme with short public key size over lattices in the standard model,” Intl. Journal of Computer Mathematics, pp. 1–10, 2015. [12] M. Green and G. Ateniese, “Identity-based proxy re-encryption,” in Proceedings of the 5th International Conference on Applied Cryptography and Network Security, ser. ACNS ’07. Berlin, Heidelberg: Springer-Verlag, 2007, pp. 288–306. [
  • 5. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com