Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "86a5eb11-5ecb-4ac0-89fb-e184d532e6c3"}, "_deposit": {"created_by": 45, "id": "6632", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "depid", "value": "6632"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/00006632", "sets": ["user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "An Integrative Access Control with an Attributes-based Event Handler for Data Protection in Cloud Storage", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "For many enterprises, cost savings and reducing the\nsecurity risk are very important for data exchanging\nbetween all the involved parties. Cloud computing allows\nusers to use different services which save storage and\nmaintenance costs. The personal data has to be protected\nagainst unauthorized accesses in cloud storage. This\npaper shows an integrative access control with an\nattributes-based event handler for data protection. This\naccess control is also an improvement of ciphertext policy\nattribute-based encryption (CP-ABE). In this access\ncontrol scheme, a data owner firstly chooses an attributebased\naccess policy before he encrypts his data, and then\nencrypts the data. Moreover, an attributes-based event\nhandler is integrated in this scheme before decryption\nphase. Every authorized/unauthorized user has to be\nchecked by this handler. If and only if a user can pass this\nhandler, he/she can decrypt the data. This handler checks\nevery user by four cases. All of the four cases in this\nhandler depend on both attributes-based policy and\nsession timer of user during his/her requests for\nciphertext. This integrative access control intends to give\na full right on data owner to define access policy and to\nget a fine-grained access control for data protection in\ncloud storage."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "cloud storage"}, {"interim": "attribute-based access control (ABAC)"}, {"interim": "attribute-based encryption (ABE)"}, {"interim": "ciphertext policy ABE (CP-ABE)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-11-26"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "An Integrative Access Control with an Attributes-based Event Handler for Data Protection in Cloud Storage.pdf", "filesize": [{"value": "389 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 389000.0, "url": {"url": "https://meral.edu.mm/api/files/86a5eb11-5ecb-4ac0-89fb-e184d532e6c3/An%20Integrative%20Access%20Control%20with%20an%20Attributes-based%20Event%20Handler%20for%20Data%20Protection%20in%20Cloud%20Storage.pdf"}, "version_id": "f3daa417-8485-43fe-bed3-6b91ba6c8315"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "ICAIT-2017", "subitem_c_date": "1-2 November, 2017", "subitem_conference_title": "1st International Conference on Advanced Information Technologies", "subitem_place": "Yangon, Myanmar", "subitem_session": "Workshop Session", "subitem_website": "https://www.uit.edu.mm/icait-2017/"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Phyo Wah Wah Myint"}, {"subitem_authors_fullname": "Swe Zin Hlaing"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-11-02"}, "item_title": "An Integrative Access Control with an Attributes-based Event Handler for Data Protection in Cloud Storage", "item_type_id": "21", "owner": "45", "path": ["1605779935331"], "permalink_uri": "https://meral.edu.mm/records/6632", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-11-26"}, "publish_date": "2020-11-26", "publish_status": "0", "recid": "6632", "relation": {}, "relation_version_is_last": true, "title": ["An Integrative Access Control with an Attributes-based Event Handler for Data Protection in Cloud Storage"], "weko_shared_id": -1}
  1. University of Information Technology
  2. International Conference on Advanced Information Technologies

An Integrative Access Control with an Attributes-based Event Handler for Data Protection in Cloud Storage

https://meral.edu.mm/records/6632
https://meral.edu.mm/records/6632
dfeb9f5a-f80f-496c-add9-6011ece08415
86a5eb11-5ecb-4ac0-89fb-e184d532e6c3
Name / File License Actions
An An Integrative Access Control with an Attributes-based Event Handler for Data Protection in Cloud Storage.pdf (389 Kb)
license.icon
Publication type
Conference paper
Upload type
Publication
Title
Title An Integrative Access Control with an Attributes-based Event Handler for Data Protection in Cloud Storage
Language en
Publication date 2017-11-02
Authors
Phyo Wah Wah Myint
Swe Zin Hlaing
Description
For many enterprises, cost savings and reducing the
security risk are very important for data exchanging
between all the involved parties. Cloud computing allows
users to use different services which save storage and
maintenance costs. The personal data has to be protected
against unauthorized accesses in cloud storage. This
paper shows an integrative access control with an
attributes-based event handler for data protection. This
access control is also an improvement of ciphertext policy
attribute-based encryption (CP-ABE). In this access
control scheme, a data owner firstly chooses an attributebased
access policy before he encrypts his data, and then
encrypts the data. Moreover, an attributes-based event
handler is integrated in this scheme before decryption
phase. Every authorized/unauthorized user has to be
checked by this handler. If and only if a user can pass this
handler, he/she can decrypt the data. This handler checks
every user by four cases. All of the four cases in this
handler depend on both attributes-based policy and
session timer of user during his/her requests for
ciphertext. This integrative access control intends to give
a full right on data owner to define access policy and to
get a fine-grained access control for data protection in
cloud storage.
Keywords
cloud storage, attribute-based access control (ABAC), attribute-based encryption (ABE), ciphertext policy ABE (CP-ABE)
Conference papers
ICAIT-2017
1-2 November, 2017
1st International Conference on Advanced Information Technologies
Yangon, Myanmar
Workshop Session
https://www.uit.edu.mm/icait-2017/
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-11-26 08:11:29.375512
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL