P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing

01/08/2018
by   Ehab Zaghloul, et al.
0

Cloud computing has changed the way enterprises store, access and share data. Data is constantly being uploaded to the cloud and shared within an organization built on a hierarchy of many different individuals that are given certain data access privileges. With more data storage needs turning over to the cloud, finding a secure and efficient data access structure has become a major research issue. With different access privileges, individuals with more privileges (at higher levels of the hierarchy) are granted access to more sensitive data than those with fewer privileges (at lower levels of the hierarchy). In this paper, a Privilege-based Multilevel Organizational Data-sharing scheme (P-MOD) is proposed that incorporates a privilege-based access structure into an attribute-based encryption mechanism to handle these concerns. Each level of the privilege-based access structure is affiliated with an access policy that is uniquely defined by specific attributes. Data is then encrypted under each access policy at every level to grant access to specific data users based on their data access privileges. An individual ranked at a certain level can decrypt the ciphertext (at that specific level) if and only if that individual owns a correct set of attributes that can satisfy the access policy of that level. The user may also decrypt the ciphertexts at the lower levels with respect to the user's level. Security analysis shows that P-MOD is secure against adaptively chosen plaintext attack assuming the DBDH assumption holds.The comprehensive performance analysis demonstrates that P-MOD is more efficient in computational complexity and storage space than the existing schemes in secure data sharing within an organization.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/11/2020

A Role-Based Encryption Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context

Role-Based Access Control (RBAC) is a popular model which maps roles to ...
research
01/17/2023

Command Line Interface Risk Modeling

Protecting sensitive data is an essential part of security in cloud comp...
research
04/02/2019

On the Analysis of the Revocable-Storage Identity-Based Encryption Scheme

Cloud computing can provide a flexible way to effectively share data amo...
research
10/25/2018

Secure Data Access for Wireless Body Sensor Networks

Recently, with the support of mobile cloud computing, a large number of ...
research
02/24/2020

Semantic, Efficient, and Secure Search over Encrypted Cloud Data

Companies and individuals demand more and more storage space and computi...
research
12/28/2018

A Precedent Approach to Assigning Access Rights

To design a discretionary access control policy, a technique is proposed...
research
07/23/2018

Leveraging OpenStack and Ceph for a Controlled-Access Data Cloud

While traditional HPC has and continues to satisfy most workflows, a new...

Please sign up or login with your details

Forgot password? Click here to reset