Nowadays cloud is being used by both individuals and organizations to store and share the data without establishing their own data center. The outsourcings of these data are becoming a major security issue for businesses. Searchable encryption is one of the prominent techniques which allow the data owner to securely store the data and then share the data for their growth in business. With this technique, Cloud Service Provider can process the user request by searching on encrypted stored data without decrypting the data. In this paper we analyze different searchable encryption techniques for secure data sharing and their preventive attacks. We also proposed a method named “User Prediction in Role” to reduce the insider attack possibility in Role Based Data Sharing (RBDS), which is based on user priority levels in a role. Priorities will be decided by role manager based on the roles of a user in the organization and also predict the role assignment for new user. The proposed method can helps the organization to avoid the unauthorized data leakage.
CITATION STYLE
Jyosthna, P. M., & Reddy, K. T. (2019). User prediction in a role for secure data sharing through cloud. International Journal of Innovative Technology and Exploring Engineering, 8(10), 162–166. https://doi.org/10.35940/ijitee.G5425.0881019
Mendeley helps you to discover research relevant for your work.