Privacy aware access control for data sharing in cloud computing environments

16Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.

Abstract

In cloud computing environments, data protection is usually limited to access control policies that are enforced by cloud service providers (CSPs). However, there are many cases where the CSPs are not trusted and pose a risk to their users' privacy. Several approaches have been proposed to prevent CSPs from accessing the data where the cryptographic mechanisms are used to enforce access control policies. However, most of these approaches incur a huge communication overhead, involve users in a complex and expensive key management process and are burdensome for users. In this paper, we propose a privacy aware access control system for data sharing that provides two levels of protection for user's data stored on a CSP. The users' data is protected from unauthorized users using a CSP-enforced access control mechanism, while protection from the CSP is achieved through multiple layers of commutative encryption with the help of a third-party service provider. We present the proposed framework and describe its components and various cryptographic operations. Furthermore, we provide a security analysis to discuss potential threats against the proposed system and provide some solutions for those threats. © 2014 ACM.

Cite

CITATION STYLE

APA

Takabi, H. (2014). Privacy aware access control for data sharing in cloud computing environments. In SCC 2014 - Proceedings of the 2nd International Workshop on Security in Cloud Computing (pp. 27–34). Association for Computing Machinery. https://doi.org/10.1145/2600075.2600076

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free