eCite Digital Repository

Task-oriented access model for secure data sharing over cloud


Ahmad, M and Pervez, Z and Lee, S and Kang, BH, Task-oriented access model for secure data sharing over cloud, Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication (IMCOM 2015), 8-10 January 2015, Bali, Indonesia, pp. 1-7. ISBN 9781450333771 (2015) [Refereed Conference Paper]

Not available

Copyright Statement

Copyright 2014 ACM

Official URL:

DOI: doi:10.1145/2701126.2701186


Cloud computing has become a prevalent technology and with its increased maturity more and more data including sensitive and non sensitive, is being centralized into it . While outsourcing the sensitive data into public cloud, its prior encryption is strongly recommended. Provisioning of encryption and existing work that guarantee security and privacy concerns on sensitive data, have removed the holdouts against cloud adoption at a large. One of the main issue with this data in cloud environment is to manage user access and its auto revocation in a controlled and exible way. The issue becomes more complex when privacy on user access has to be ensured as well to hide additional leakage of information. For automatic revocation over cloud data, access can be bounded within certain anticipated time limit so that the access expires beyond e ective time period as proposed by one of the existing system as time based proxy re-encryption. This time-oriented approach is more rigid and not a one-size- ts-all solution. In certain circumstances exact time anticipation is not an easy choice. Instead, the alternate solution could be task-oriented to restrict user beyond certain number of permissible attempts to access the data. In this paper we have proposed a system that allows authorized users to access encrypted data for pred-e fined attempts rather pre-de fined time. Our approach allows user to avail permissible attempts without time restriction and at the same time also preserves the privacy aspect of user access by concealing access limit until availed.Performance analysis revealed that the cost of operations performed are within the range of .097 to .278 $ per 1000 requests.

Item Details

Item Type:Refereed Conference Paper
Keywords:security, privacy, cloud, access policies
Research Division:Information and Computing Sciences
Research Group:Cybersecurity and privacy
Research Field:Cybersecurity and privacy not elsewhere classified
Objective Division:Information and Communication Services
Objective Group:Information services
Objective Field:Information services not elsewhere classified
UTAS Author:Kang, BH (Professor Byeong Kang)
ID Code:107239
Year Published:2015
Deposited By:Information and Communication Technology
Deposited On:2016-03-08
Last Modified:2018-01-17

Repository Staff Only: item control page