scholarly journals PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 1882-1893 ◽  
Author(s):  
Li Lin ◽  
Ting-Ting Liu ◽  
Shuang Li ◽  
Chathura M. Sarathchandra Magurawalage ◽  
Shan-Shan Tu
2021 ◽  
Vol 7 ◽  
pp. e455
Author(s):  
Mohammed Amine Bouras ◽  
Boming Xia ◽  
Adnan Omer Abuassba ◽  
Huansheng Ning ◽  
Qinghua Lu

Access control is a critical aspect for improving the privacy and security of IoT systems. A consortium is a public or private association or a group of two or more institutes, businesses, and companies that collaborate to achieve common goals or form a resource pool to enable the sharing economy aspect. However, most access control methods are based on centralized solutions, which may lead to problems like data leakage and single-point failure. Blockchain technology has its intrinsic feature of distribution, which can be used to tackle the centralized problem of traditional access control schemes. Nevertheless, blockchain itself comes with certain limitations like the lack of scalability and poor performance. To bridge the gap of these problems, here we present a decentralized capability-based access control architecture designed for IoT consortium networks named IoT-CCAC. A blockchain-based database is utilized in our solution for better performance since it exhibits favorable features of both blockchain and conventional databases. The performance of IoT-CCAC is evaluated to demonstrate the superiority of our proposed architecture. IoT-CCAC is a secure, salable, effective solution that meets the enterprise and business’s needs and adaptable for different IoT interoperability scenarios.


Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


IET Software ◽  
2007 ◽  
Vol 1 (5) ◽  
pp. 206-216
Author(s):  
R. Su ◽  
M.R.V. Chaudron ◽  
J.J. Lukkien

Sign in / Sign up

Export Citation Format

Share Document