Back to Search
Start Over
Enforcing authorizations while protecting access confidentiality1
- Source :
- Journal of Computer Security
- Publication Year :
- 2018
-
Abstract
- Cloud computing is the reference paradigm to provide data storage and management in a convenient and scalable manner. However, moving data to the cloud raises several issues, including the confidentiality of data and of accesses that are no more under the direct control of the data owner. The shuffle index has been proposed as a solution for addressing these issues when data are stored at an external third party. In this paper, we extend the shuffle index with support for access control, that is, for enforcing authorizations on data. Our approach is based on the use of selective encryption and on the organization of data and authorizations in two shuffle indexes. Owners regulate access to their data through authorizations that allow different users to access different portions of the data, while, at the same time, the confidentiality of accesses is guaranteed. The proposed approach also supports update operations over the outsourced data collection (i.e., insertion, removal, and update) as well as of the access control policy (i.e., grant and revoke). Also, our approach protects the nature of each access operation, making revoke operations and resource removal operations indistinguishable by the storing server and/or observing users.
- Subjects :
- 0301 basic medicine
021110 strategic, defence & security studies
Data collection
Computer Networks and Communications
Computer science
business.industry
0211 other engineering and technologies
Cloud computing
Access control
02 engineering and technology
Encryption
Computer security
computer.software_genre
03 medical and health sciences
030104 developmental biology
Resource (project management)
Hardware and Architecture
Scalability
Computer data storage
Confidentiality
Safety, Risk, Reliability and Quality
business
computer
Software
Subjects
Details
- ISSN :
- 0926227X
- Database :
- OpenAIRE
- Journal :
- Journal of Computer Security
- Accession number :
- edsair.doi.dedup.....a380431e0f06747c0bc755194c3f2db4
- Full Text :
- https://doi.org/10.3233/JCS-171004