{"title":"社交网络云中基于策略属性访问控制中的数据完整性","authors":"Katanosh Morovat, B. Panda","doi":"10.1109/CSCI49370.2019.00011","DOIUrl":null,"url":null,"abstract":"The integrity of files stored on cloud is crucial for many applications, specifically applications that manage online social networks. Now-a-days social networking sites have become primary locations for sharing documents. Due to security lapses at these sites, shared documents could be stolen or changed by cyber attackers. We have developed a model to protect shared data and resources from unauthorized accesses. This method, which is called policy-based attribute access control (PBAAC) [20], enables resource owners to define policies to manage their resources from unmanaged accesses. However, policies are saved as plain text in a file and could be compromised by unauthorized users, violating the integrity of those policies. In this paper, we proposed a method to protect policies saved in text files. We developed an algorithm to extract critical information from each policy and create a hash value, by executing a hash cryptography algorithm.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data Integrity in Policy-Based Attribute Access Control in Social Network Cloud\",\"authors\":\"Katanosh Morovat, B. Panda\",\"doi\":\"10.1109/CSCI49370.2019.00011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The integrity of files stored on cloud is crucial for many applications, specifically applications that manage online social networks. Now-a-days social networking sites have become primary locations for sharing documents. Due to security lapses at these sites, shared documents could be stolen or changed by cyber attackers. We have developed a model to protect shared data and resources from unauthorized accesses. This method, which is called policy-based attribute access control (PBAAC) [20], enables resource owners to define policies to manage their resources from unmanaged accesses. However, policies are saved as plain text in a file and could be compromised by unauthorized users, violating the integrity of those policies. In this paper, we proposed a method to protect policies saved in text files. We developed an algorithm to extract critical information from each policy and create a hash value, by executing a hash cryptography algorithm.\",\"PeriodicalId\":103662,\"journal\":{\"name\":\"2019 International Conference on Computational Science and Computational Intelligence (CSCI)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Computational Science and Computational Intelligence (CSCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCI49370.2019.00011\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCI49370.2019.00011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data Integrity in Policy-Based Attribute Access Control in Social Network Cloud
The integrity of files stored on cloud is crucial for many applications, specifically applications that manage online social networks. Now-a-days social networking sites have become primary locations for sharing documents. Due to security lapses at these sites, shared documents could be stolen or changed by cyber attackers. We have developed a model to protect shared data and resources from unauthorized accesses. This method, which is called policy-based attribute access control (PBAAC) [20], enables resource owners to define policies to manage their resources from unmanaged accesses. However, policies are saved as plain text in a file and could be compromised by unauthorized users, violating the integrity of those policies. In this paper, we proposed a method to protect policies saved in text files. We developed an algorithm to extract critical information from each policy and create a hash value, by executing a hash cryptography algorithm.