Attribute based encryption algorithm assignment
Order ID 53563633773 Type Essay Writer Level Masters Style APA Sources/References 4 Perfect Number of Pages to Order 5-10 Pages Description/Paper Instructions
Attribute based encryption algorithm assignment
RESEARCH PAPER
Introduction
Cipher on its own can be defined as an algorithm that is usually used together with a plain text to get a ciphertext. Ciphertext therefore is the unreadable outcome or result of the encryption algorithm. The word cipher is most cases used as a substitute for ciphertext. Cyphertext is usually not understandable to the user until it has been decrypted to a plain text using the decryption key mostly known only to the legal and authorized system users in order to protect the information being passed between the communicating parties. There are different types of ciphers
Attribute based encryption algorithm
Attribute-based encryption algorithm is regarded as a current encryption technique with satisfactory grained access regulation in the virtual storage. Attribute-based encryption algorithm is usually categorized into two categories, which are, key-policy attribute-based encryption and the other is ciphertext-policy attribute-based encryption The key-policy attribute-based encryption scheme denotes that the ciphertext is related to an attribute set, and a user’s decryption or encryption key is linked to an access policy. A user is able to decrypt the cipher if the ciphertext’s quality set gratify the access rule of operator’s secret key. The ciphertext-policy attribute-based encryption scheme denotes to that the cipher is linked to an access policy, and an operator’s secret key, connected to an attribute set. An operator is able to decrypt the ciphertext if his attribute set gratifies the access rule in regard to the ciphertext.
The revocation machinery can be categorized into two categories which precisely are; direct revocation mechanism together with indirect revocation mechanism. In direct revocation, the sending party stipulates a revocation list during the encryption of the data. Indirect revocation on the other hand is where the authorized organizations regularly provide key informs to non-revoked operators. At present-day, numerous schemes with the direct revocation has been proposed. Nonetheless most of the proposed schemes only retracts a single feature of the operator, consequently it possibly will not gratify the actual requirements.
An attribute update is an added significant issue of concern in the attribute-based encryption environment. In real life, an operator’s attribute set might require to be be kept upto date over time when their working title role may be altered. For instance, let’s assume that Robert is a corporation employee, then his attribute set is required to be up to date when his working role is endorsed from a programmer way up to a project manager, therefore his previous attribute set 1 = “male, programmer” ought to be changed to a new attribute set 2 = “male, project manager”. In addition, the attribute authority ought to provide an update key to keep Robert’s secret key up to date. In the meantime, the attribute authority’s duty is to ensure ensure that the member of staff Robert cannot further continue with his usage of the previous key linked to the attribute set “male, programmer” to be able to have an access to the ciphertext. Therefore, the keeping the attribute up to date is not a simple procedure. Relatively, other attribute up to date schemes has been proposed. Nevertheless, most of the proposed schemes have a similar issue, the problem is that suppose there is an attribute update of the operator, and in addition many other operator’s secret key and many of ciphertexts linked with this attribute is required to be updated, it will undoubtedly misuse a lot of computational capitals.
To address this issue, there is a feasible solution given in this research paper. The major idea of the solution is that the undisclosed key of an operator is separated into two parts, the first part that is immaterial to attribute is reserved by the operator, and in addition that, the other part which is mosly applicable to attribute is sent to the virtual server. When a trait of any operator requires to be updated, the attribute authority issues an update key to virtual server. At that time virtual server updates only the secret key of this quality for all legal users, and an additional undisclosed key of all operator together with the ciphertexts linked to this attribute need not to be kept up to date. In the end, this method will significantly decrease the work load of the structure.
Even though attribute-based encryption technology delivers an effective way for information confidentiality, until now it brings an added new issue that the operators might find it problematic to search for stimulating data from a massive number of encrypted information. This problem is referred to as keyword search problem. One of the easiest searching approaches is to download altogether every encrypted data in the vicinity and thereby decrypting it, lastly to execute keyword search in plaintext. However, this method will waste huge computational supply and bring a massive cost for operator to do the decryption work.
Types of Attribute-Based Encryption
Content-Based Access Control
In an attribute-based encryption system for content-based admission control qualities will be linked with a ciphertext during encryption of sensitive data. On the flip side a private key will be associated with a policy over these.
Role-based Access Control
An ABE system for role-based access control “flips” the semantics of content-based access control. In such a system, attributes will be associated with a private key and a policy associated with the ciphertext. In such systems the attributes will often be associated with the credentials of a private key holder.
Multiauthority Role-based Access Control
One issue with role-based access control is that in many applications we would like to write access control policies that span across different administrative boundaries. One difficulty with standard ABE is that it requires one authority to hand out private keys.
Ontology-based attributes mapping
Environmental data bases cover a wide variety of fields which are increasingly recovered from heterogeneous immobile and mobile sensors. It is considered critical to assimilate computational intelligence, which includes intelligent information analysis and information-driven decision-making, to resolve the difficulties of human and environmental health risks. Considering the approaching big-data age, the operative use of ecological data for nursing and figuring human and environmental health risks under many challenges. Open data or information standards and open software architypes are crucial concepts to propose the best approaches.
Nevertheless, there is an absence of cloud computing architecture to sustain big-data analytics. Knowledge-based schemes are proposed as the answer for big-information analytics, which includes the application of programmed mode mapping to take care of data-oriented heterogeneity, and also semantic cognitive and ontology abstraction used for innovative dispensation. Cloud computing and supplies can be joint into big-info analytics to deliver more real operations. In order to influence the aptitudes of service-oriented choice sustenance systems, big-info and analytics are put into the cloud. Some innovative cloud-based set-ups are projected to model and evaluate environmental health and dangers.
Sensor web environment
- a) Sensor Web Management Framework
The OGC Observations and Measurements standard is used to encode and archive real-time observation results and values by sensors. OGC Sensor Model Language contains the Extensive Makeup Language schema and standard models for describing sensor systems and procedures. It also offers a list of the information that is needed to discover the sensors, the procedure of low-level observations, and the process attributes. OGC SWE Common Data Model Encoding delimits the low-level data models, which are used for exchanging referred data between nodes.
a) Semantic Sensor Web Management
Ontologies and many other semantic skills can become essential sensor web machineries, because they improve the interoperability and incorporation of semantics, and for the reason that they promote the OGC standard. It is significant to create the core ideas and relations of the sensor ontologies to define the sensor knowledge.
- b) Human and Ecological Health Risks Ontology (HERO) Based on SSNO
The HERO comprises of Sensor, Observation, and Spectacle ontology mechanisms. The Observation can be labeled with the Health Risk constituent. The measured Spectacle objects might be any normal element or incident.
c) Human and Ecological Health Risk Management System (Heems)
On top of SWMF homogenous borders and HERO virtual universal elements, HaEHMS entails below main subsystems:
(1) Environmental Sensing Subsystem
Keeping keen eye and monitoring of subsystems supplying in the least sensed observations and their broadcast from local and nationwide backbone platforms.
(2) Environmental Information Databases
These databases are functional in information technology structure and shared ideals and procedures that are in a position of delivering historical data, biological observations and delayed patterns.
(3) Cloud Computing
Information provisioning systems are useful in capturing messages from the substantial world, interrelate with varied apparatus and observation circumstances, own high-speed dispensation abilities, and administrate huge data.
Algebra based policies integration
This policy integration system uses algebra to provide a description, inference and calculate the attribute-based policy in ac diverse environment in order to solve policy integration and conflict. The algebra-based policies integration was proposed by Bonnatti et al. its main concept consists of subject, object and action that is conducted on an authorization item. It uses operations like union, intersection and difference to provide a description of the various access control policy integration methods.
In the case there are two access policies x and y in two different domains x and y with the intersection, union and difference operations represented as ⊗, ⊕ and ⊥ respectively then the algebra formed is as follows with s,r and e representing the subjects;
Policy x (⊗) policy y=((s, r, e|s,r,e) € policy x and (s,r,e) € policy y)
Meaning if (s, r, e) satisfies both Policy x and Policy y, then access is granted otherwise denied.
Policy x intersection (⊕) policy y=((s, r, e|s,r,e) € policy x or (s,r,e) € policy y)
Meaning if (s, r, e) satisfies Policy x or Policy y, then the access is granted otherwise denied.
Policy x (⊥) policy y=((s, r, e|s,r,e) € policy x and (s,r,e) ~€ policy y)
Meaning if (s, r, e) satisfies Policy x but not Policy y, then the access is granted otherwise denied.
For example;
In case there are two cloud applications x and y with access policies where for policy x users that have a credit is higher than 0.7 and are identified as members are able to read the files whose security level are defined to be lower than 2. On the other hand, policy y dictates that users whose credit is higher than 0.8 and are members are able to read files that have s defined security level not greater than 3. The algebra policy intergration formulates the example as
Policy x=([<s1,s2>r,e]|s1>0.7, s2=member<=2,e=read)
Policy y=([<s1,s2>r,e]|s1>0.8, s2=member<=3,e=read)
Which equals;
Policy x(⊗) Policy y=([<s1,s2>r,e]|s1>0.8, s2=member<=2,e=read)
Solutions for identification and access authorization
The technologies that offer solution to identification and access authorization in the cloud computing system are mainly cross domain. The access control in this domain is made up of two main schemes, the attribute-based control and role-based access control. In the role-based authorization, method is static and supports fine grained control therefore making it unsuitable for application to the cloud storage system making the ABAC model a better choice in the cloud storage system.
The ABAC model defines three attributes in relation to access control. These include subject, resource and environment attributes. Subject defines an entity that has the ability to operate a resource i.e. a user or application. Each subject has an attribute to describe it including name, age etc. Resource on the other hand refers to the entity that is being operated by the subject and finally, environment describes the various environments that a subject is found when trying to access a resource i.e. technical, situational etc.
RUBRIC
QUALITY OF RESPONSE NO RESPONSE POOR / UNSATISFACTORY SATISFACTORY GOOD EXCELLENT Content (worth a maximum of 50% of the total points) Zero points: Student failed to submit the final paper. 20 points out of 50: The essay illustrates poor understanding of the relevant material by failing to address or incorrectly addressing the relevant content; failing to identify or inaccurately explaining/defining key concepts/ideas; ignoring or incorrectly explaining key points/claims and the reasoning behind them; and/or incorrectly or inappropriately using terminology; and elements of the response are lacking. 30 points out of 50: The essay illustrates a rudimentary understanding of the relevant material by mentioning but not full explaining the relevant content; identifying some of the key concepts/ideas though failing to fully or accurately explain many of them; using terminology, though sometimes inaccurately or inappropriately; and/or incorporating some key claims/points but failing to explain the reasoning behind them or doing so inaccurately. Elements of the required response may also be lacking. 40 points out of 50: The essay illustrates solid understanding of the relevant material by correctly addressing most of the relevant content; identifying and explaining most of the key concepts/ideas; using correct terminology; explaining the reasoning behind most of the key points/claims; and/or where necessary or useful, substantiating some points with accurate examples. The answer is complete. 50 points: The essay illustrates exemplary understanding of the relevant material by thoroughly and correctly addressing the relevant content; identifying and explaining all of the key concepts/ideas; using correct terminology explaining the reasoning behind key points/claims and substantiating, as necessary/useful, points with several accurate and illuminating examples. No aspects of the required answer are missing. Use of Sources (worth a maximum of 20% of the total points). Zero points: Student failed to include citations and/or references. Or the student failed to submit a final paper. 5 out 20 points: Sources are seldom cited to support statements and/or format of citations are not recognizable as APA 6th Edition format. There are major errors in the formation of the references and citations. And/or there is a major reliance on highly questionable. The Student fails to provide an adequate synthesis of research collected for the paper. 10 out 20 points: References to scholarly sources are occasionally given; many statements seem unsubstantiated. Frequent errors in APA 6th Edition format, leaving the reader confused about the source of the information. There are significant errors of the formation in the references and citations. And/or there is a significant use of highly questionable sources. 15 out 20 points: Credible Scholarly sources are used effectively support claims and are, for the most part, clear and fairly represented. APA 6th Edition is used with only a few minor errors. There are minor errors in reference and/or citations. And/or there is some use of questionable sources. 20 points: Credible scholarly sources are used to give compelling evidence to support claims and are clearly and fairly represented. APA 6th Edition format is used accurately and consistently. The student uses above the maximum required references in the development of the assignment. Grammar (worth maximum of 20% of total points) Zero points: Student failed to submit the final paper. 5 points out of 20: The paper does not communicate ideas/points clearly due to inappropriate use of terminology and vague language; thoughts and sentences are disjointed or incomprehensible; organization lacking; and/or numerous grammatical, spelling/punctuation errors 10 points out 20: The paper is often unclear and difficult to follow due to some inappropriate terminology and/or vague language; ideas may be fragmented, wandering and/or repetitive; poor organization; and/or some grammatical, spelling, punctuation errors 15 points out of 20: The paper is mostly clear as a result of appropriate use of terminology and minimal vagueness; no tangents and no repetition; fairly good organization; almost perfect grammar, spelling, punctuation, and word usage. 20 points: The paper is clear, concise, and a pleasure to read as a result of appropriate and precise use of terminology; total coherence of thoughts and presentation and logical organization; and the essay is error free. Structure of the Paper (worth 10% of total points) Zero points: Student failed to submit the final paper. 3 points out of 10: Student needs to develop better formatting skills. The paper omits significant structural elements required for and APA 6th edition paper. Formatting of the paper has major flaws. The paper does not conform to APA 6th edition requirements whatsoever. 5 points out of 10: Appearance of final paper demonstrates the student’s limited ability to format the paper. There are significant errors in formatting and/or the total omission of major components of an APA 6th edition paper. They can include the omission of the cover page, abstract, and page numbers. Additionally the page has major formatting issues with spacing or paragraph formation. Font size might not conform to size requirements. The student also significantly writes too large or too short of and paper 7 points out of 10: Research paper presents an above-average use of formatting skills. The paper has slight errors within the paper. This can include small errors or omissions with the cover page, abstract, page number, and headers. There could be also slight formatting issues with the document spacing or the font Additionally the paper might slightly exceed or undershoot the specific number of required written pages for the assignment. 10 points: Student provides a high-caliber, formatted paper. This includes an APA 6th edition cover page, abstract, page number, headers and is double spaced in 12’ Times Roman Font. Additionally, the paper conforms to the specific number of required written pages and neither goes over or under the specified length of the paper. GET THIS PROJECT NOW BY CLICKING ON THIS LINK TO PLACE THE ORDER
CLICK ON THE LINK HERE: https://www.perfectacademic.com/orders/ordernow
Also, you can place the order at www.collegepaper.us/orders/ordernow / www.phdwriters.us/orders/ordernow
Do You Have Any Other Essay/Assignment/Class Project/Homework Related to this? Click Here Now [CLICK ME]and Have It Done by Our PhD Qualified Writers!!