Enforcing Multi-user Security Policies in Cloud Computing

Abstract

The user can access data from any server with unlimited data with the security. Multi-user tendency will cost lesser than the expected cost in the single user environment. While dealing with cloud computing, confidential data can be secured from the unauthorized access and internal threats. Cloud servers use smart techniques for achieving this requirement like encryption and decryption of data. The database is stored in the encrypted format on the server & a complex query can be fired on it. Cloud server will maintain the access control policies to reveal the data from the database that are in the encrypted format. In the access control policies, we use KMA (Key Management Authority) which provides the keyset for encryption & decryption of the database. The attributes entered by the user will create one public key which is cipher text based. So this technique is called as cipher text based technique. This key is used for encryption. While registering, user will choose the policy and select the attributes on which security policy is based. Because of this it is called as cipher text policy attribute based encryption (CP-ABE). To achieve this complex encryption, we can use many algorithms like AES or DES encryption algorithms with CPABE algorithm. This scheme allows making SQL-like queries on encrypted database in multiuser environment while at the same time, the database owner assign different access rights to users that defines a specific policy for the database. The major use of this encryption is privacy, access control and data confidentiality and multi-user access control.

Authors and Affiliations

Mrs. Shubhada P. Mone , Mrs. Sunita S. Dhotre

Keywords

Related Articles

Scaling of Dimensions & Gate Capacitances of MOSFET 

The scaling of complementary metal oxide semiconductor (CMOS) transistors has led to the silicon dioxide layer used as a gate dielectric becoming so thin (1.4 nm) that its leakage current is too large. It is necess...

STUDY OF NONLINEAR POLEMETRIC MIXTURE BY S.R. METHOD 

Lquid crystals are states of condensed matter whose symmetries lie between crystals and isotropic liquids Thermotropic liquid crystalline phases are exhibited by a large number of organic compounds shows molecu...

Solving Digital Circuit Layout Problem based on Graph Partitioning Technique: A Glance 

—Digital Circuit Layout is a combinatorial optimization problem. Due to the complexity of integrated circuits, the first step in physical design is usually to divide a design into subdesigns. The work presents a br...

Implementation of Citation Parser on the Basis of Knowledge Base Hierarchy 

Use of the bibliographical information of publications available on the Internet is an important task in academic research. Accurate reference metadata extraction for publications is essential for the integration...

Energy Efficient Geographical Routing Protocol with Location Aware Routing in MANET  

A Mobile Ad hoc Network (MANET) is a kind of wireless ad-hoc network, and is a self configuring network of mobile routers (and associated hosts) connected by wireless links the union of which forms an arbitrary t...

Download PDF file
  • EP ID EP93546
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

Mrs. Shubhada P. Mone, Mrs. Sunita S. Dhotre (2013). Enforcing Multi-user Security Policies in Cloud Computing. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(5), 1784-1788. https://www.europub.co.uk/articles/-A-93546