RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Ciphertext-Policy Attribute-Based Encryption for Access Control of Data in Cloud

        Vijaya Lakshmi Paruchuri,N Lakshmipathi Anantha,Vara Lakshmi Konagala,Debnath Bhattacharyya 보안공학연구지원센터 2016 International Journal of Software Engineering and Vol.10 No.8

        In Distributed systems, the users with a certain set of attributes can only be able to access the data. At present this process can be done through a trusted server where we will store the data and there will be certain constraints on the access of the data. In this case there will be a possibility to compromise the data and so the confidentiality of the data is lost. An Attribute-Based Encryption (ABE) is an encryption scheme, where users with some attributes can decrypt ciphertexts associated with these attributes. Now this is our turn to develop a system with a more complex policy of access of the encrypted data and which can be called as Ciphertext Policy Attribute-based Encryption (CP-ABE). By using this method the information can't be traded off even through the trusted server where the information is put away. These methods are also secure against the collusion attack. In this method attributes are generally assigned in the form of access trees. The attributes are placed at the leaf nodes of this access tree. In older Attribute-based encryption strategies encrypted data is described by the attributes and policies are given to the user’s keys, while in our system users credentials are described by the attributes and there will be a policy where it tells us about who should access or decrypt the data. So, this type of access method is very much closer to the Role-based attribute-based encryption.

      • User Behaviour Profiling in Cloud using One Class SVM : A Review

        Vijaya Lakshmi Paruchuri,S. Suresh Babu,P S V S Sridhar,Debnath Bhattacharyya,Hye-Jin Kim 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.9

        Distributed computing guarantees to on a very basic level change the way we utilize PCs and get to and store our own specific and business data. With these new registering and correspondences models develop new data security challenges. Existing information security structures, for instance, encryption have fizzled in imagining information theft strikes, particularly those executed by an insider to the cloud supplier. We propose a substitute methodology for securing information in the cloud utilizing adversarial mimic improvement. We screen data access in the cloud and perceive unpredictable data access outlines. Right when unapproved access is suspected and after that confirmed using test questions, we dispatch a disinformation strike by giving back a considerable measure of fake information to the attacker. This secures against the misuse of the customer's real data. Trials coordinated in a neighbor-hood archive setting give confirmation this technique may give unprecedented levels of customer data security in a Cloud space.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼