RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Supporting relationships in access control using role based access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
An Extended Authorization Model for Relational Databases
IEEE Transactions on Knowledge and Data Engineering
Farsite: federated, available, and reliable storage for an incompletely trusted environment
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
A Flexible Payment Scheme and Its Role-Based Access Control
IEEE Transactions on Knowledge and Data Engineering
Plutus: Scalable Secure File Sharing on Untrusted Storage
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Securing distributed storage: challenges, techniques, and systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
Secure untrusted data repository (SUNDR)
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Over-encryption: management of access control evolution on outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Sharoes: A Data Sharing Platform for Outsourced Enterprise Storage Environments
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Effective Collaboration with Information Sharing in Virtual Universities
IEEE Transactions on Knowledge and Data Engineering
Secure and efficient access to outsourced data
Proceedings of the 2009 ACM workshop on Cloud computing security
Encryption policies for regulating access to outsourced data
ACM Transactions on Database Systems (TODS)
Publishing anonymous survey rating data
Data Mining and Knowledge Discovery
Access control and authorization for protecting disseminative information in E-learning workflow
Concurrency and Computation: Practice & Experience
Privacy-Preserving database systems
Foundations of Security Analysis and Design III
Satisfying Privacy Requirements Before Data Anonymization
The Computer Journal
Hi-index | 0.00 |
Data outsourcing is a major component for cloud computing that allows data owners to distribute resources to external services for users and organizations who can apply the resources. A crucial problem for owners is how to make sure their sensitive information accessed by legitimate users only using the trusted services but not authorized to read the actual information. We address the problem with role-based access control to enforce selective access to outsourced data without involving the owner in the access control authorization. The basic idea is to combine cryptography with authorizations, data owners assign keys to roles that will enforce access via encryption. A formal role-based access model is designed to analyse the translating an authorization policy into an equivalent encryption policy. The paper also investigates the affect of role hirarchy structure in the authorization process. The comparisions to other related work are presented. Finnaly the future work are introduced.