Toward Information Sharing: Benefit And Risk Access Control (BARAC)

Author(s):  
Lei Zhang ◽  
A. Brodsky ◽  
S. Jajodia
Author(s):  
Shoko Miyagawa ◽  
Shigeichiro Yamasaki ◽  
Eiko Uchiyama ◽  
Donald L. Amoroso

In this paper, the authors present a framework for information sharing with privacy and priority control in long-term care designed to promote appropriate information sharing among the people who are involved in long-term care for provision of better care service. The authors' framework includes four agents (user agent, local information system access agent, authentication/access control agent and priority control agent) and two databases (user database and care record index database). The LIS (local information system) access agent creates and updates the care record index database, which act as an index when user agents try to access to care recipient's record, based on the Open Authentication protocol. It also acts as a query interface from each user agent. The authentication/access control agent allows sensitive information to be shared in accordance with the policy defined by care recipient. The priority control agent judges the urgency of the information for either periodic or immediate notification. The authors also propose an implementation of this framework using the Resource Description Framework Site Summary, and demonstrate how our framework works with the scenario of care recipient's unexpected injury. In summary, this framework is designed to help people who require long-term care and provides an effective system for each staff that is in charge of administering long-term care services. The authors' information sharing system incorporates a multi-agent architecture to facilitate information sharing and privacy/priority control. The authors believe that this research provides an important first step for researchers who intend to build a prototype to automate the processes of information sharing for long-term health care.


Author(s):  
Krishna Keerthi Chennam ◽  
M. Akka Lakshmi

Information sharing in the cloud, powered by good patterns in cloud technology, is rising as a guaranteeing procedure for permitting users to advantageously access information. However, the growing number of enterprises and customers who stores their information in cloud servers is progressively challenging users’ privacy and the security of information. This paper concentrates on providing a dependable and secure cloud information sharing services that permits users dynamic access to their information. In order to achieve this, propose an effective, adaptable and flexible privacy preserving information policy with semantic security, by using Cipher text Policy Element Based Encryption (CP-EBE) consolidated with Character Based Encryption (CBE) systems. To ensure strong information sharing security, the policy succeeds in protecting the privacy of cloud users and supports efficient and secure dynamic operations, but not constrained to, file creation, user revocation. Security analysis demonstrates that the proposed policy is secure under the generic bi- linear group model in the random oracle model and enforces fine-grained access control, full collusion resistance and retrogressive secrecy. Furthermore, performance analysis and experimental results demonstrate that the overheads are as light as possible.<br /><br />


Author(s):  
Krishna Keerthi Chennam ◽  
M. Akka Lakshmi

Information sharing in the cloud, powered by good patterns in cloud technology, is rising as a guaranteeing procedure for permitting users to advantageously access information. However, the growing number of enterprises and customers who stores their information in cloud servers is progressively challenging users’ privacy and the security of information. This paper concentrates on providing a dependable and secure cloud information sharing services that permits users dynamic access to their information. In order to achieve this, propose an effective, adaptable and flexible privacy preserving information policy with semantic security, by using Cipher text Policy Element Based Encryption (CP-EBE) consolidated with Character Based Encryption (CBE) systems. To ensure strong information sharing security, the policy succeeds in protecting the privacy of cloud users and supports efficient and secure dynamic operations, but not constrained to, file creation, user revocation. Security analysis demonstrates that the proposed policy is secure under the generic bi- linear group model in the random oracle model and enforces fine-grained access control, full collusion resistance and retrogressive secrecy. Furthermore, performance analysis and experimental results demonstrate that the overheads are as light as possible.<br /><br />


2020 ◽  
Vol 9 (1) ◽  
pp. 63-80
Author(s):  
Auxilia M. ◽  
Raja K. ◽  
Kannan K.

In the evolution of social networks and big data, secure information sharing is a crucial task. When information is shared between the user and the organization admin, security plays a key role in any business organization in terms of privacy. Though many fruitful solutions prevail to protect the data integrity and privacy, there is a huge space for novel data protection schemes where a large set of data are involved. In this article, the Cloud-Based Access Control (C-BAC) framework is proposed which can fit in any business organization application. In this C-BAC, Policy Enforcement Point (PEP) is used to avoid unwanted information sharing with the neighboring employee. C-BAC framework with RSA provides security, based on the number of employees with the data handled by the particular employee, better than the existing access control framework with asymmetric encryption standard (AES) and Rivest–Shamir–Adleman (RSA) in terms of individual information handling.


Sign in / Sign up

Export Citation Format

Share Document