5 research outputs found

    Efficient Search On Encrypted Files In Cloud

    Get PDF
    A progressive characteristic based encryption conspires is first intended for an document collection. A lot of archives can be scrambled together on the off chance that they share an incorporated access structure. Contrasted and the Ciphertext-Policy Attribute-Based Encryption (CP-ABE) plans, both the Ciphertext extra room and time expenses of encryption/unscrambling are spared. At that point, a document structure named Attribute-Based Retrieval features (ARF) tree is developed for the archive accumulation dependent on the Term Frequency-Inverse Document Frequency(TF-IDF) show and the reports' qualities. A profundity first search calculation for the ARF tree is intended to improve the hunt effectiveness which can be additionally improved by parallel computing. With the exception of the archive accumulations, our plan can be additionally connected to different datasets by altering the ARF tree slightly

    Secure Semi-Automated GDPR Compliance Service with Restrictive Fine-grained Access Control

    Get PDF
    Sharing personal data with service providers is a contentious issue that led to the birth of data regulations such as the EU General Data Protection Regulation (GDPR) and similar laws in the US. Complying with these regulations is a must for service providers. For users, this compliance assures them that their data is handled the way the service provider says it will be via their privacy policy. Auditing service providers’ compliance is usually carried out by specific authorities when there is a need to do so (e.g., data breach). Nonetheless, these irregular compliance checks could lead to non-compliant actions being undetected for long periods. Users need an improved way to make sure their data is managed properly, giving them the ability to control and enforce detailed, restricted access to their data, in line with the policies set by the service provider. This work addresses these issues by providing a secure semi-automated GDPR compliance service for both users and service providers using smart contracts and attribute-based encryption with accountability. Privacy policies will be automatically checked for compliance before a service commences. Users can then upload their personal data with restrictive access controls extracted from the approved privacy policy. Operations’ logs on the personal data during its full lifecycle will be immutably recorded and regularly checked for compliance to ensure the privacy policy is adhered to at all times. Evaluation results, using a real-world organisation policy and example logs, show that the proposed service achieves these goals with low time overhead and high throughput
    corecore