M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for WomenProfessor, Priyadarshini Institute of Technology and Science for Women
Cloud computing, as an emerging computing standard. Cloud computing enables users to remotely store
their data in a cloud and also benefit from services on-demand. With rapid development of cloud computing, more
enterprises will outsource their sensitive data for sharing in a cloud. Delegation is a process of sharing access rights by
users of an access control model. It facilitates the distribution of authorities in the model. It is also useful in collaborative
environments. Delegation may also result in privacy violations if it allows accessing data without the data providerâ€™s
consent. Even Though the consent is taken, the privacy can still be violated if the data is used differently than the data
provider agreed. Our work investigates data privacy in delegation. Based on this setting, a delegation model is designed
to consider the privacy policies in taking delegation decisions and also, to set the data usage criteria for the access right
A.NAGA BALA,D.RAVIKIRAN."Entrustment of Access Control in Public Clouds". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.1, Issue 06,pp.421-427, DECEMBER - 2014, URL :https://ijcert.org/ems/ijcert_papers/V1I612.pdf,
M. Nabeel and E. Bertino, â€šPrivacy preserving
delegated access control in the storage as a service
model,â€› in EEE International Conference on
Information Reuse and Integration (IRI), 2012.
 E. Bertino and E. Ferrari, â€šSecure and selective
dissemination of XML documents,â€› ACM Trans.
Inf. Syst. Secur., vol. 5, no. 3, pp. 290â€“331, 2002.
 G. Miklau and D. Suciu, â€šControlling access to
published data using cryptography,â€› in VLDB
â€™2003: Proceedings of the 29th international
conference on Very large data bases. VLDB
Endowment, 2003, pp. 898â€“909.
N. Shang, M. Nabeel, F. Paci, and E. Bertino, â€šA
privacy- preserving approach to policy-based
content dissemination,â€› in ICDE â€™10: Proceedings
of the 2010 IEEE 26th International Conference on
Data Engineering, 2010.
 M. Nabeel, E. Bertino, M. Kantarcioglu, and B.
M. ThuraisÂ ingham, â€šTowards privacy preserving
access control in the cloud,â€› in Proceedings of the
7th International Conference on Col- laborative
Computing: Networking, Applications and Worksharing, ser. CollaborateCom â€™11, 2011, pp.
 M. Nabeel, N. Shang, and E. Bertino, â€šPrivacy
preserving pol- icy based content sharing in public
clouds,â€› IEEE Transactions on Knowledge and
Data Engineering, 2012.
 S. D. C. di Vimercati, S. Foresti, S. Jajodia, S.
Paraboschi, and P. Samarati, â€šOver-encryption:
Management of access control evolution on
outsourced data,â€› in Proceedings of the 33rd
International Conference on Very Large Data
Bases, ser. VLDB â€™07. VLDB Endowment, 2007, pp.
 M. Nabeel and E. Bertino, â€šTowards attribute
based group key management,â€› in Proceedings of
the 18th ACM conference on Computer and
communications security, Chicago, Illinois, USA,
A. Fiat and M. Naor, â€šBroadcast encryption,â€› in
Proceedings of the 13th Annual International
Cryptology Conference on Advances in
Cryptology, ser. CRYPTO â€™93. London, UK:
Springer-Verlag, 1994, pp. 480â€“491.
 D. Naor, M. Naor, and J. B. Lotspiech,
â€šRevocation and tracing schemes for stateless
receivers,â€› in Proceedings of the 21st Annual
International Cryptology Conference on Advances
in Cryptology, ser. CRYPTO â€™01. London, UK:
Springer-Verlag, 2001, pp. 41â€“62.
 J. Li and N. Li, â€šOACerts: Oblivious attribute
certificates,â€› IEEE Transactions on Dependable and
Secure Computing, vol. 3, no. 4, pp. 340â€“352, 2006.
T. Pedersen, â€šNon-interactive and informationtheoretic secure verifiable secret sharing,â€› in
CRYPTO â€™91: Proceedings of the 11th Annual
International Cryptology Conference on Advances
in Cryptology. London, UK: Springer-Verlag, 1992,
 M. Nabeel and E. Bertino, â€šAttribute based
group key manageÂ ment,â€› IEEE Transactions on
Dependable and Secure Computing, 2012.
 A. Shamir, â€šHow to share a secret,â€› The
Communication of ACM, vol. 22, pp. 612â€“613,
 V. Shoup, â€šNTL library for doing number
 â€šOpenSSL the open source toolkit for
*17+ â€šboolstuff a boolean expression tree toolkit,â€›
 A. Schaad, J. Moffett, and J. Jacob, â€šThe rolebased access con- trol system of a european bank: a
case study and discussion,â€› in Proceedings of the
sixth ACM symposium on Access control models
and technologies, ser. SACMAT â€™01. New York,
NY, USA: ACM, 2001, pp. 3â€“9.
 K. Fisler, S. Krishnamurthi, L. A. Meyerovich,
and M. C. Tschantz, â€šVerification and changeimpact analysis of access- control policies,â€› in
Proceedings of the 27th international confer- ence
on Software engineering, ser. ICSE â€™05. New York,
NY, USA: ACM, 2005, pp. 196â€“205.
 S. Coull, M. Green, and S. Hohenberger,
â€šControlling access to an oblivious database using
stateful anonymous credentials,â€› in Irvine:
Proceedings of the 12th International Conference
on Prac- tice and Theory in Public Key
Cryptography. Berlin, Heidelberg: SpringerVerlag, 2009, pp. 501â€“520.
 J. Camenisch, M. Dubovitskaya, and G.
Neven, â€šOblivious transfer with access control,â€› in
CCS â€™09: Proceedings of the 16th ACM conference
on Computer and communications security. New
York, NY, USA: ACM, 2009, pp. 131â€“140.
 K. P. N. Puttaswamy, C. Kruegel, and B. Y.
Zhao, â€šSilverline: toward data confidentiality in
storage-intensive cloud appliÂ cations,â€› in
Proceedings of the 2nd ACM Symposium on
Cloud Computing, ser. SOCC â€™11. New York, NY,
USA: ACM, 2011, pp. 10:1â€“10:13.
 A. Sahai and B. Waters, â€šFuzzy identity-based
encryption,â€› in Eurocrypt 2005, LNCS 3494.
Springer-Verlag, 2005, pp. 457â€“ 473.
 M. Pirretti, P. Traynor, P. McDaniel, and B.
Waters, â€šSecure attribute-based systems,â€› in CCS
â€™06: Proceedings of the 13th ACM conference on
Computer and communications security. New
York, NY, USA: ACM, 2006, pp. 99â€“112.
 V. Goyal, O. Pandey, A. Sahai, and B. Waters,
â€šAttribute-based encryption for fine-grained access
control of encrypted data,â€› in CCS â€™06: Proceedings
of the 13th ACM conference on Computer and communications security. New York, NY, USA:
ACM, 2006, pp. 89â€“98.
 J. Bethencourt, A. Sahai, and B. Waters,
â€šCiphertext-policy attribute-based encryption,â€› in
SP â€™07: Proceedings of the 2007 IEEE Symposium
on Security and Privacy. Washington, DC, USA:
IEEE Computer Society, 2007, pp. 321â€“334.