Access control, attribute based access control, public key encryption

Access control, attribute based access control, public key encryption

The signature method used to capture a specific threat and not allow the threats to interfere with the cloud data. However, the signature method recognizes only threats that are known to its directory; this is unable to recognize the unknown threats.

The cloud-native application pattern is used for cloud data security purpose. However, designing the cloud-native application (CNA) pattern is a complex procedure that requires detailed planning and has no defined steps.

The key features of the privacy preserving and public auditing?are:

  • Public auditing
  • Privacy preserving
  • Data Dynamics
  • Batch Auditing
  • Data integrity
  • Data confidentiality

Access Control

Access control is a key feature for trusted security in cloud storage services. A combination of three encryptions for cloud access security can be used. Access rules can be defined based on data characteristics, and the owner of the data can assign tasks in cloud servers without opening the actual content. The data access control can also be through user attribute rules, and authentication through identity-based signature.

Models like role-based encryption is built called as “hierarchical attribute-set-based encryption (HASBE).” This model overcomes the shortcomings of attribute-based encryption (ABE) like lack of flexibility or executing complex access policies. HASBE has the ability to employ multiple values for user access management.

Attribute-Based Access Control

A method of ciphertext delegation enabling it to be “re-encrypted” and provides security in the standard ABE framework. A dynamic policy update can be implemented for big data. The access policies can be designed for minimal computation for data owners, use of old data and access policies, algorithmic update of policies, and check mechanism for update of ciphertexts. “Ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE)” can support the attribute-based re-encryption.

Public key encryption (PKE) verifies whether two ciphertexts are encryptions of an identical message. The applications where PKE is useful are searchable encryption and encrypted data partitioning.

There are many data security concepts on cloud servers such as schemes, protocols, algorithms, access policies, storage scenarios, access services, and a third-party auditor.

A comparison of different models of data integrity and security models can be done based on common features, public auditing, privacy preserving, data dynamic, batch auditing, data integrity, and data confidentiality; since there are no specific guidelines yet.




Joshua Maddux

I help businesses 3x+ their customer interactions (leads) online.

3 年

Love it!

Angel Ribo II

Your Channel Partner Game remains an enigmatic maze to most, a labyrinth of missed opportunities and misunderstood dynamics. When will You summon the courage to unravel its secrets and harness its potential?

3 年

Thank you for sharing.

Jiri Fiala

Managing Partner VC Fund 2.0 | Family Office | CxO | Technology Polymath | Entrepreneur twitter.com/Skzites

3 年

The post made me think, thanks Ayush!

要查看或添加评论,请登录

Ayush Pandey的更多文章

  • P-adic numbers are beautiful

    P-adic numbers are beautiful

    Large scale complex decentralized distributed systems collect large amounts of data. In order to understand these…

    73 条评论
  • IoT Hybrid Cloud Edge Cyber Attack Security

    IoT Hybrid Cloud Edge Cyber Attack Security

    Large scale deployed Internet of Things (IoT) devices using cloud- and edge-based services with complex dynamic IoT…

    125 条评论
  • Hybrid Cloud Edge 5G IoT Open Networking

    Hybrid Cloud Edge 5G IoT Open Networking

    Google Distributed Cloud Edge allows operators to run radio access network(RAN) functions and core network elements at…

    62 条评论
  • OpenDayLight OpenFlow OpenVSwitch

    OpenDayLight OpenFlow OpenVSwitch

    OpenDayLight is a SDN controller that provisions the network policies as specified and sends that information to the…

    67 条评论
  • Container Management Systems | Consistency & Persistent Data Protection in Cloud-Fog-IoT

    Container Management Systems | Consistency & Persistent Data Protection in Cloud-Fog-IoT

    It may get difficult to recollect or reconciliate after one's been too engrossed in implemeting an application/model a…

    72 条评论
  • Monitoring service level matrics

    Monitoring service level matrics

    In order to understand if your system is reliable, available, or useful; a deep understanding of SLOs, SLAs, and SLIs…

    76 条评论
  • Monitoring vs Observability

    Monitoring vs Observability

    Few excerpts from the book I felt worth noting down. Monitoring does not require a human operator; it can and should be…

    68 条评论
  • Traditional infrastructure security vs Cloud native security

    Traditional infrastructure security vs Cloud native security

    For tradional infrastructures; anyone inside the corporate network was trusted, and anyone outside wasn’t trusted…

    65 条评论
  • Scale-up vs Scale-out

    Scale-up vs Scale-out

    Monolithic is a term primarily used in software architecture which means a system is tightly coupled. Monolithic apps…

    51 条评论
  • Multi-Model Databases vs Polyglot Persistent Databases

    Multi-Model Databases vs Polyglot Persistent Databases

    The below diagram was helpful for me to differentiate among decentralized, distributed and centralized. Centralization…

    43 条评论

社区洞察

其他会员也浏览了