logo

Enabling Fine-Grained Access Control Over Encrypted Data

   

Added on  2022-08-21

3 Pages824 Words16 Views
 | 
 | 
 | 
Enabling Fine-Grained Access Control Over Encrypted Data
SUMMARY OF PROJECT
Current technological advancements have invented new ways in which users can access and store their
data. Even though the current schemes are relatively cheap and easy to use, there is still a challenge.
This can be attributed to the fact that some of the information can be accessed and misused by
unauthorized attackers. Use of cloud computing as a way of storing data has been widely adopted. In
order to ensure that the information stored by the user can only be accessed by authorized parties,
encryption schemes have been used. In this report, we will elaborate on both the attribute-based
encryption and public-key encryption.
PROBLEM STATEMENT
Even though the use of cloud computing is more effective, there has been a challenge in relation to
securing the users' data. In the cases where the cloud server has been breached, the attacker can misuse
the customers' information. In order to satisfy security efficiency of the users' data, there must be
security measures set aside to prevent the attacker from accessing an misusing the clients' data -the
technique used must be reliable
LITERATURE REVIEW
The use of cloud computing offers an on-demand infrastructure when the user wants to access and use
data and other resources. The companies offering the service have to use encryption techniques to
secure data in the private cloud. One of the schemes used to secure the data through encryption is the
cipher-text-policy attribute-based encryption (CP-ABE). This technique allows the user to share
sensitive information through encryption embedded with hidden access control policies (Zhang &
Zhang, 2011).
The public key encryption technique is ineffective in securing sensitive infraction. This is because it
applies an asymmetric cryptography system where public keys are used for encryption and decryption.
This makes it possible for any user to access the data if they have the public keys. The advantage of the
CP-ABE over public-key encryption is that only the authorized user can access and use the data. This
technique also ensures scalability since the policy attributes can be added. The use of several rules/
attributes will help is information audits in cases where the authorized users access and misuse the data
shared.
RESEARCH AIMS
The following are the research questions that steered the research:
a) What is encryption?
b) What level of encryption should be implemented?
Enabling Fine-Grained Access Control Over Encrypted Data_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Encryption Technique in Cloud Computing - MITS50004 IT Security
|9
|2427
|94

Cloud Technology and Fundamentals | Assignment
|5
|1198
|18

Internet of Things in Healthcare: Literature Review and Annotated Bibliography
|9
|2470
|133

MITS50004 IT SECURITY.
|8
|455
|95

Disadvantages of Cloud Services and Outsourcing Sensitive Data
|2
|636
|80

Cloud computing management information system
|5
|1244
|186