Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage

@article{Zhou2013AchievingSR,
  title={Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage},
  author={Lan Zhou and Vijay Varadharajan and Michael Hitchens},
  journal={IEEE Transactions on Information Forensics and Security},
  year={2013},
  volume={8},
  pages={1947-1960}
}
With the rapid developments occurring in cloud computing and services, there has been a growing trend to use the cloud for large-scale data storage. This has raised the important security issue of how to control and prevent unauthorized access to data stored in the cloud. One well known access control model is the role-based access control (RBAC), which provides flexible controls and management by having two mappings, users to roles and roles to privileges on data objects. In this paper, we… CONTINUE READING
Highly Cited
This paper has 129 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 71 extracted citations

DATA SECURITY 3 . 1 A Secure and Verifiable Access Control Scheme for Big Data Storage in Cloud

K. RoslinDayana, Assistant, Gummidipoondi Taluk, Vigilson Prem
2018
View 4 Excerpts
Highly Influenced

Enforcing Access Control Policies over Data Stored on Untrusted Server

2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) • 2017
View 4 Excerpts
Highly Influenced

Privacy in a Digital, Networked World

Computer Communications and Networks • 2015
View 5 Excerpts
Highly Influenced

Data Security Policies in Cloud : A Survey

Kasundra Punitkumar, Shikha Pachouly, Seung-Hyun Seo
2014
View 4 Excerpts
Highly Influenced

Running Big Data Privacy Preservation in the Hybrid Cloud Platform

Onkar S. Undale
2016
View 3 Excerpts
Highly Influenced

A Critical Analysis on Cloud Security

Madhvi Popli
2018
View 1 Excerpt

129 Citations

02040'14'15'16'17'18'19
Citations per Year
Semantic Scholar estimates that this publication has 129 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 37 references

On the pseudo-random generator ISAAC

IACR Cryptology ePrint Archive • 2006
View 6 Excerpts
Highly Influenced

Isaac

R. J. Jenkins
FSE (Lecture Notes in Computer Science), vol. 1039. New York, NY, USA: Springer-Verlag, Feb. 1996, pp. 41–49. • 1996
View 6 Excerpts
Highly Influenced

Recommendation for key management—Part 1: General (revision 3)

E. Barker, W. Barker, W. Burr, W. Polk, M. Smid
NIST, Gaithersburg, MD, USA, Tech. Rep. SP800-57, May 2011. • 2011

A view of cloud computing

Commun. ACM • 2010
View 1 Excerpt

Personal Data in the Cloud: A Global Survey of Consumer Attitudes [Online]. Available: http://www.fujitsu.com/ downloads/SOL/fai/reports/fujitsu_personal-data-in-the-cloud.pdf

F. R. Institute
2010
View 1 Excerpt

Similar Papers

Loading similar papers…