User prediction in a role for secure data sharing through cloud

Citations of this article
Mendeley users who have this article in their library.
Get full text


Nowadays cloud is being used by both individuals and organizations to store and share the data without establishing their own data center. The outsourcings of these data are becoming a major security issue for businesses. Searchable encryption is one of the prominent techniques which allow the data owner to securely store the data and then share the data for their growth in business. With this technique, Cloud Service Provider can process the user request by searching on encrypted stored data without decrypting the data. In this paper we analyze different searchable encryption techniques for secure data sharing and their preventive attacks. We also proposed a method named “User Prediction in Role” to reduce the insider attack possibility in Role Based Data Sharing (RBDS), which is based on user priority levels in a role. Priorities will be decided by role manager based on the roles of a user in the organization and also predict the role assignment for new user. The proposed method can helps the organization to avoid the unauthorized data leakage.




Jyosthna, P. M., & Reddy, K. T. (2019). User prediction in a role for secure data sharing through cloud. International Journal of Innovative Technology and Exploring Engineering, 8(10), 162–166.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free