Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Entrustment of Access Control in Public Clouds

M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
Professor, Priyadarshini Institute of Technology and Science for Women

Cloud computing, as an emerging computing standard. Cloud computing enables users to remotely store their data in a cloud and also benefit from services on-demand. With rapid development of cloud computing, more enterprises will outsource their sensitive data for sharing in a cloud. Delegation is a process of sharing access rights by users of an access control model. It facilitates the distribution of authorities in the model. It is also useful in collaborative environments. Delegation may also result in privacy violations if it allows accessing data without the data provider’s consent. Even Though the consent is taken, the privacy can still be violated if the data is used differently than the data provider agreed. Our work investigates data privacy in delegation. Based on this setting, a delegation model is designed to consider the privacy policies in taking delegation decisions and also, to set the data usage criteria for the access right receivers

A.NAGA BALA,D.RAVIKIRAN."Entrustment of Access Control in Public Clouds". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.1, Issue 06,pp.421-427, DECEMBER - 2014, URL :,

Keywords : Delegation, privacy, access control, security, policy.

[1]M. Nabeel and E. Bertino, ‚Privacy preserving
delegated access control in the storage as a service
model,‛ in EEE International Conference on
Information Reuse and Integration (IRI), 2012.
[2] E. Bertino and E. Ferrari, ‚Secure and selective
dissemination of XML documents,‛ ACM Trans.
Inf. Syst. Secur., vol. 5, no. 3, pp. 290–331, 2002.
[3] G. Miklau and D. Suciu, ‚Controlling access to
published data using cryptography,‛ in VLDB
’2003: Proceedings of the 29th international
conference on Very large data bases. VLDB
Endowment, 2003, pp. 898–909.
[4]N. Shang, M. Nabeel, F. Paci, and E. Bertino, ‚A
privacy- preserving approach to policy-based
content dissemination,‛ in ICDE ’10: Proceedings
of the 2010 IEEE 26th International Conference on
Data Engineering, 2010.
[5] M. Nabeel, E. Bertino, M. Kantarcioglu, and B.
M. Thurais­ ingham, ‚Towards privacy preserving
access control in the cloud,‛ in Proceedings of the
7th International Conference on Col- laborative
Computing: Networking, Applications and Worksharing, ser. CollaborateCom ’11, 2011, pp.
[6] M. Nabeel, N. Shang, and E. Bertino, ‚Privacy
preserving pol- icy based content sharing in public
clouds,‛ IEEE Transactions on Knowledge and
Data Engineering, 2012.
[7] S. D. C. di Vimercati, S. Foresti, S. Jajodia, S.
Paraboschi, and P. Samarati, ‚Over-encryption:
Management of access control evolution on
outsourced data,‛ in Proceedings of the 33rd
International Conference on Very Large Data
Bases, ser. VLDB ’07. VLDB Endowment, 2007, pp.
[8] M. Nabeel and E. Bertino, ‚Towards attribute
based group key management,‛ in Proceedings of
the 18th ACM conference on Computer and
communications security, Chicago, Illinois, USA,
[9]A. Fiat and M. Naor, ‚Broadcast encryption,‛ in
Proceedings of the 13th Annual International
Cryptology Conference on Advances in
Cryptology, ser. CRYPTO ’93. London, UK:
Springer-Verlag, 1994, pp. 480–491.
[10] D. Naor, M. Naor, and J. B. Lotspiech,
‚Revocation and tracing schemes for stateless
receivers,‛ in Proceedings of the 21st Annual
International Cryptology Conference on Advances
in Cryptology, ser. CRYPTO ’01. London, UK:
Springer-Verlag, 2001, pp. 41–62.
[11] J. Li and N. Li, ‚OACerts: Oblivious attribute
certificates,‛ IEEE Transactions on Dependable and
Secure Computing, vol. 3, no. 4, pp. 340–352, 2006.
[12]T. Pedersen, ‚Non-interactive and informationtheoretic secure verifiable secret sharing,‛ in
CRYPTO ’91: Proceedings of the 11th Annual
International Cryptology Conference on Advances
in Cryptology. London, UK: Springer-Verlag, 1992,
pp. 129–140.
[13] M. Nabeel and E. Bertino, ‚Attribute based
group key manage­ ment,‛ IEEE Transactions on
Dependable and Secure Computing, 2012.
[14] A. Shamir, ‚How to share a secret,‛ The
Communication of ACM, vol. 22, pp. 612–613,
November 1979.
[15] V. Shoup, ‚NTL library for doing number
[16] ‚OpenSSL the open source toolkit for
*17+ ‚boolstuff a boolean expression tree toolkit,‛
[18] A. Schaad, J. Moffett, and J. Jacob, ‚The rolebased access con- trol system of a european bank: a
case study and discussion,‛ in Proceedings of the
sixth ACM symposium on Access control models
and technologies, ser. SACMAT ’01. New York,
NY, USA: ACM, 2001, pp. 3–9.
[19] K. Fisler, S. Krishnamurthi, L. A. Meyerovich,
and M. C. Tschantz, ‚Verification and changeimpact analysis of access- control policies,‛ in
Proceedings of the 27th international confer- ence
on Software engineering, ser. ICSE ’05. New York,
NY, USA: ACM, 2005, pp. 196–205.
[20] S. Coull, M. Green, and S. Hohenberger,
‚Controlling access to an oblivious database using
stateful anonymous credentials,‛ in Irvine:
Proceedings of the 12th International Conference
on Prac- tice and Theory in Public Key
Cryptography. Berlin, Heidelberg: SpringerVerlag, 2009, pp. 501–520.
[21] J. Camenisch, M. Dubovitskaya, and G.
Neven, ‚Oblivious transfer with access control,‛ in
CCS ’09: Proceedings of the 16th ACM conference
on Computer and communications security. New
York, NY, USA: ACM, 2009, pp. 131–140.
[22] K. P. N. Puttaswamy, C. Kruegel, and B. Y.
Zhao, ‚Silverline: toward data confidentiality in
storage-intensive cloud appli­ cations,‛ in
Proceedings of the 2nd ACM Symposium on
Cloud Computing, ser. SOCC ’11. New York, NY,
USA: ACM, 2011, pp. 10:1–10:13.
[23] A. Sahai and B. Waters, ‚Fuzzy identity-based
encryption,‛ in Eurocrypt 2005, LNCS 3494.
Springer-Verlag, 2005, pp. 457– 473.
[24] M. Pirretti, P. Traynor, P. McDaniel, and B.
Waters, ‚Secure attribute-based systems,‛ in CCS
’06: Proceedings of the 13th ACM conference on
Computer and communications security. New
York, NY, USA: ACM, 2006, pp. 99–112.
[25] V. Goyal, O. Pandey, A. Sahai, and B. Waters,
‚Attribute-based encryption for fine-grained access
control of encrypted data,‛ in CCS ’06: Proceedings
of the 13th ACM conference on Computer and communications security. New York, NY, USA:
ACM, 2006, pp. 89–98.
[26] J. Bethencourt, A. Sahai, and B. Waters,
‚Ciphertext-policy attribute-based encryption,‛ in
SP ’07: Proceedings of the 2007 IEEE Symposium
on Security and Privacy. Washington, DC, USA:
IEEE Computer Society, 2007, pp. 321–334. 


Download :

Refbacks : Currently there are no Refbacks


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events

Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.

Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.

IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert

IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)

Emerging Sources Citation Index (in process)

IJCERT title is under evaluation by Scopus.

Key Dates

☞   LAST DATE OF SUBMISSION : 31st March 2023
In 7 Days

Important Announcements

All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index

Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)

Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links

Conference Proposal