scholarly journals Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider

2006 ◽  
Vol 2 ◽  
pp. 39-44 ◽  
Author(s):  
Amril Syalim ◽  
Toshihiro Tabata ◽  
Kouichi Sakurai

As a noteworthy business worldview, a few on-line information stages have developed to fulfill society's wants for individual explicit learning, any place a service provider assembles raw data from data givers, at that point offers data services to data clients. Notwithstanding, inside the data exchanging level, the data customers face a squeezing issue, i.e., an approach to confirm whether the service provider has actually gathered and handled data. During this paper, we propose TPDM, that effectively compose truthfulness and Privacy protection in data Markets. TPDM is structured inside in partner degree Encrypt-then-Sign way; utilize mostly homomorphism encryption and identity-based signature. It along encourage bunch confirmation, processing, and result check, though giving identity protection and data confidentiality. We used dataset and 2015 RECS dataset, severally. Our examination and investigation results that TPDM accomplishes numerous alluring properties, though obtaining low calculation and correspondence overheads once sustaining huge size data markets


2004 ◽  
Vol 7 (1) ◽  
pp. 128-174 ◽  
Author(s):  
Jaehong Park ◽  
Ravi Sandhu
Keyword(s):  

2019 ◽  
Vol 8 (4) ◽  
pp. 7267-7271

Access control and Data confidentiality are key technology to ensure the security of system and to protect the privacy of the users. The modified Collaborative Trust Enhanced Security (CTES) model has an inbuilt access control mechanism for Kerberos protocol itself to enforce the access control policy directly into the Client system node. This paper explains the hybrid access control model with Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC) for modified CTES framework through Kerberos protocol. Hence, it retains the concept of “role”, “group” and “attributes” for the user which are necessary to protect data privacy in the system. Data confidentiality for the stored data in Cloud is achieved by cryptographic techniques. Gnu Privacy Guard (GnuPG) based certificate is capable enough to verify the identity of the correspondent in information exchange as well as the information integrity. It is a strongest authentication technique where the user is asked to provide his/her digital ID for validation in the Server and enables Single sign-on services for Kerberos Authorization in modified CTES model. In this paper, it is proposed for a new Kerberos Authorization with Hybrid Access Control Model (KAHAC) for single-domain systems and multi-domain systems in Public Cloud based on roles, attributes, groups, access modes and the type of resources.


2014 ◽  
Vol 43 ◽  
pp. 159-187 ◽  
Author(s):  
Lorena González-Manzano ◽  
Ana I. González-Tablas ◽  
José M. de Fuentes ◽  
Arturo Ribagorda

2014 ◽  
Vol 886 ◽  
pp. 605-608
Author(s):  
Fei Liu

During the applications development of pervasive computing, access control is new demands advanced by pervasive computing. Usage Control models are used to solve access control. This paper uses these models to solve problem of access control in Pervasive Computing environment and provides a model of Usage Control in Pervasive Computing (UCONpc), context information and delegation rights satisfy the features of access control in pervasive computing system.


Sign in / Sign up

Export Citation Format

Share Document