DESIGN OF ACCESS CONTROL MODEL FOR DATA SHARING USING ATTRIBUTE BASED ENCRYPTION WITH CASE STUDY OF RESEARCH DATA SHARING

Research data is the most important thing in research because one of the factors of research success depends on the research data. For this reason, good research data management is needed. One important aspect in research is sharing research data with other parties for use in future research. Resear...

Full description

Saved in:
Bibliographic Details
Main Author: Sutoro
Format: Theses
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/45919
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
Description
Summary:Research data is the most important thing in research because one of the factors of research success depends on the research data. For this reason, good research data management is needed. One important aspect in research is sharing research data with other parties for use in future research. Research data that is sensitive and confidential can only be accessed by certain parties who have the right to access it. Therefore, in addition to protecting the confidentiality of research data, it is also necessary to have an access control mechanism for research data that is shared on cloud storage. The access control mechanism is used to limit access to research data to only authorized users. Attribute-based encryption is one solution that can be used to guarantee data confidentiality while providing access control mechanisms. Data owners can encrypt data and determine data access policies by placing it in the research data ciphertext. Users who can access the research data are users who have attributes that meet the access policy rules set by the data owner. In this research, a development of research data sharing models in cloud storage is carried out by implementing attribute-based encryption. The results of tests carried out indicate that attribute-based encryption can provide a guarantee of good data confidentiality. In performance, the resulting throughput and delay are still acceptable.