Presentation Review1

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

ADAPTIVE SECURE

DOCUMENT ACCESS
MECHANISM IN CLOUD

Guided by
Dr M.Priyadharshini

BY
Anitha.P
Janani.C
PROBLEM STATEMENT

• To secure the protection of information put away in the


cloud and the cryptographic methodologies don't address the
issues of trust.
ABSTARCT
• Trust enhanced RBAC permits clients to store gigantic
measure of information on interest.

• The Centralized Server helps to access information from


anywhere ,anytime.

• In order to avoid leakage of information , certain


restrictions are implemented by the owner, roles or grade.

• This also helps one to access the data in various places


through their login authentication.
LITERATURE SURVEY

1.A Data Outsourcing Architecture Combining


Cryptography and Access Control(2) :

An approach for enforcing authorization policies and supporting


dynamic authorizations.
Demerits: Need to integration with the Web paradigm.

2.Achieving Secure, Scalable, and Fine-grained Data


Access Control in Cloud Computing(4) :
It defines and enforce access policies based
on data attributes, and, allow the data owner to
delegate the computation tasks to control untrusted
cloud servers.
Demerits :Data confidentiality, and scalability
simultaneously,
which is not provided by current work
Continue…
3.Enforcing Role-Based Access Control
for Secure Data Storage in the Cloud(6):

RBE Scheme introduced to encrypt data and grant access to that data for
users with specific roles.
Demerits: It has to provide further administrative convenience and
Scalability.

4.Trust Based Access Control Scheme for Pervasive


Computing Environment(27):

The trustworthiness of the user and the


recommender are formulated using fuzzy set and fuzzy logic
Demerits: New user is based only on recommender list.
EXISTING SYSTEM

• The existing works control the access privileges of a


user depending on his or her roles.

• For security the system generate OTP to the user


which is not secured.

• In existing user level security is not able to protect the


sensitive secured document on the organization.

• It lacks in Remote service authentication.


PROPOSED SYSTEM
 The proposed trust models take into account role inheritance and
hierarchy in the evaluation of trustworthiness of roles.

 The proposed trust models address the trust in cryptographic RBAC


schemes using role and context based approach.

 The proposed model provides trust models for owners and roles in
RBAC systems which are using cryptographic RBAC schemes to
secure stored data.

 RBAC simplifies the security management is large scale system, RBE


decentralizes the user management to individual roles.

 It constrains what a user can do, as well as what programs executing on


behalf of the users are allowed to do.
Adaptive
user secure Shared
access
documents

User User details


admin manage
ment role

Upload
docume upload
nts

Secure
element

place
Security time
select
device

role
CONCLUSION

• In this way the access control module seeks to prevent the


activity that could lead to breach of security.

• With the support of RBAC and cryptographic algorithm, we


able to do the access control enforcement.

• This system consider many aspects of user for accessing the


secured file.
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy