Abstract: A prototype is developed for the multiuser model to control the access to the data set stored in a malicious cloud environment. Alike cloud storage, other platforms have the capability to share the information in a secure manner. The proposal is to enable access control over the data stored in a cloud by the absence of provider involvement. A vital tool of the access control system is a ciphertext policy attribute-based encryption scheme with dynamic attributes and enhanced encryption methodologies. By the usage of decentralized ledger, the proposed system provides an immutable log of all required security events which includes generation of keys, access policy assignments, changes/revocations, and access requests. We have implemented a set of rules to make sure the privacy of operations that demands secret or private keys, but hash codes are sent through the ledger. A proposed prototype of the model was applied using smart contracts and tested on the platform.
Publication Year: 2020
Publication Date: 2020-12-01
Language: en
Type: book-chapter
Indexed In: ['crossref']
Access and Citation
Cited By Count: 6
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot