International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 51 - Number 12 |
Year of Publication: 2012 |
Authors: B. N. Jagdale, Vidya S. Kurtadikar, J. W. Bakal |
10.5120/8091-1669 |
B. N. Jagdale, Vidya S. Kurtadikar, J. W. Bakal . A Heuristic Approach for Encryption Policies in Data Outsourcing. International Journal of Computer Applications. 51, 12 ( August 2012), 1-6. DOI=10.5120/8091-1669
In the era of globalization and dynamic world economies, data outsourcing is inevitable. Security is major concern in data outsourcing environment since data is under the custody of a third party service provider. In present systems DBAs of third party can access and view data even though they are not authorized to do so. This may lead to serious data theft and leakages causing severe business impact to data owner. There are certain many such cases occurred in financial and insurance sector. In this paper we have proposed a novel solution to overcome the problem by combining access control with encryption and digital signature of data. A heuristic approach is presented to convert an authorization policy into an equivalent encryption policy while minimizing the no of keys and tokens to be managed. Different policy enforcement can be applied to different dataset as per security and integrity requirement.