User prediction in a role for secure data sharing through cloud

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays cloud is being used by both individuals and organizations to store and share the data without establishing their own data center. The outsourcings of these data are becoming a major security issue for businesses. Searchable encryption is one of the prominent techniques which allow the data owner to securely store the data and then share the data for their growth in business. With this technique, Cloud Service Provider can process the user request by searching on encrypted stored data without decrypting the data. In this paper we analyze different searchable encryption techniques for secure data sharing and their preventive attacks. We also proposed a method named “User Prediction in Role” to reduce the insider attack possibility in Role Based Data Sharing (RBDS), which is based on user priority levels in a role. Priorities will be decided by role manager based on the roles of a user in the organization and also predict the role assignment for new user. The proposed method can helps the organization to avoid the unauthorized data leakage.

Cite

CITATION STYLE

APA

Jyosthna, P. M., & Reddy, K. T. (2019). User prediction in a role for secure data sharing through cloud. International Journal of Innovative Technology and Exploring Engineering, 8(10), 162–166. https://doi.org/10.35940/ijitee.G5425.0881019

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free