Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security model based encryption to protect data on cloud
Ghebghoub Y., Boussaid O., Oukid S.  ISDOC 2014 (Proceedings of the International Conference on Information Systems and Design of Communication, Lisbon, Portugal, May 16-17, 2014)50-55.2014.Type:Proceedings
Date Reviewed: Aug 8 2014

In general, encryption is applied to clouds in rather unimaginative ways, mostly to protect storage or communications, as with other distributed systems. When I saw “model-based encryption” in the title, I expected an interesting paper. This paper comes from an ACM conference, the International Conference on Information Systems and Design of Communication (ISDOC), and I assumed it would have a good level of quality. I was soon disappointed on both counts.

The authors’ abstract model, common information model (CIM), requires the data owner to encrypt the data, which is stored on a shared server. For authorization, the owner defines a variation of the role-based access control (RBAC) model: organization-based RBAC (ORBAC). The paper says that if the users have the right roles, they can decrypt the data; however, it does not explain how they obtain the necessary keys. Three variations of the authorization model are used, but there is no explanation of how the three models relate to each other. The authors’ experiments compare their model with RBAC with respect to precision and recall. Precision and recall are used for information retrieval. They are strange measures for authorization algorithms. Authorization systems allow users to access all of the data for which they are authorized, so these measures do not apply to them. Also, it is not clear why this model is related to clouds, as indicated in the title.

The English is very poor, which makes understanding even more difficult. Finally, several references are incomplete.

Reviewer:  E. B. Fernandez Review #: CR142604 (1411-0972)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Access Controls (D.4.6 ... )
 
 
Authentication (D.4.6 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Access Controls": Date
Access control lists in capability environments
Lopriore L. Technology and Science of Informatics 3(3): 163-174, 1984. Type: Article
Mar 1 1985
Some variants of the take-grant protection model
Biskup J. (ed) Information Processing Letters 19(3): 151-156, 1984. Type: Article
Jun 1 1985
On access checking in capability-based systems
Kain R., Landwehr C. (ed) IEEE Transactions on Software Engineering SE-13(2): 202-207, 1987. Type: Article
Dec 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy