Document (access control.docx) need to be rewrite according to the research proposal( Research proposal.docx) in the attachment. Areas needed to update in Research proposal: Document should be unique,
CYPHER TEXT POLICIES PROVIDES EFFECTIVE SECURITY FOR CLOUD STORAGE
Proposal Requirements:
In Current distributed systems user able to access the data related to an individual or an organization or vendor, by having certain credentials to access the data, which can be used in proper manner or many miss usages may occur because of this access related issues (L. Gehlod, 2013), to avoid all these circumstances, we are proposing cipher text policies, which handles data encryption for key fields, such as user account numbers social security numbers, and address, if this information is miss used it can identically leads to identity theft of an individual which ideally going to affect organizational reputation in the market . In this paper we are going to present how these issues can be handled in complex as well as distributed and non-trusted server environment (D. Pal, 2015). So, to avoid all these implementing cloud storage systems is the essential method with this we can protect user’s sensitive information. The key technologies introduce Cipher text-Policy Attribute-Based Encryption algorithm (CP-ABE), ontology-based attributes mapping (L. Gehlod, 2013), algebra-based policies integration, and solutions for identification, access authorization and identity federation. At last, we concluded this paper and proposed some directions in the future work of access control research in cloud storage system (L. Gehlod, 2013). This paper can help to understand the key technologies of access control in cloud storage and helpful in the future researches. In this paper we are going to walkthrough below topics such as
Cipher text-Policy.
Attribute-Based Encryption algorithm.
Ontology-based attributes mapping.
Algebra-based policies integration.
Solutions for identification and Access authorization.
Access control research in cloud storage system.
References
D. Pal, P. K. (2015). Multilevel Threshold Secret Sharing in Distributed Cloud. Security in Computing and Communications, 13-23.
L. Gehlod, V. J. (2013). Cloud Computing and Synchronization Tools. International journal of advanced research in computer and communication engineering , 3026-3030.