User Prediction in a Role for Secure Data Sharing Through Cloud
Pattabhi Mary Jyosthna1, Konala Thammi Reddy2

1Mrs. P. Mary Jyosthna, Department of CSE, GITAM Institute of Technology, Visakhapatnam, India.
2Dr. Konala Thammi Reddy, Department of CSE, GITAM Institute of Technology, Visakhapatnam, India.

Manuscript received on 02 July 2019 | Revised Manuscript received on 05 July 2019 | Manuscript published on 30 August 2019 | PP: 162-166 | Volume-8 Issue-10, August 2019 | Retrieval Number: G5425058719/2019©BEIESP | DOI: 10.35940/ijitee.G5425.0881019
Open Access | Ethics and  Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Nowadays cloud is being used by both individuals and organizations to store and share the data without establishing their own data center. The outsourcings of these data are becoming a major security issue for businesses. Searchable encryption is one of the prominent techniques which allow the data owner to securely store the data and then share the data for their growth in business. With this technique, Cloud Service Provider can process the user request by searching on encrypted stored data without decrypting the data. In this paper we analyze different searchable encryption techniques for secure data sharing and their preventive attacks. We also proposed a method named “User Prediction in Role” to reduce the insider attack possibility in Role Based Data Sharing (RBDS), which is based on user priority levels in a role. Priorities will be decided by role manager based on the roles of a user in the organization and also predict the role assignment for new user. The proposed method can helps the organization to avoid the unauthorized data leakage. 
Keywords: cloud store, Data sharing, insider attack, Role based data sharing, Searchable Encryption
Scope of the Article: Data Mining