Author : Ms. Vibhute Shubhangi Prakash 1
Date of Publication :3rd August 2017
Abstract: Data access control is an efficient way to provide the data security in the cloud.and Attribute-based Encryption (ABE) technique cryptographic conducting tool to guarantee data owners direct control on their data in public cloud storage. In this paper, from another point of view, system lead an edge multi-power CP-ABE access control plan for open distributed storage, named TMACS. In TMACS, exploiting (t; n) limit mystery sharing, When system verify to the user the TTP work like a SDN. Its having data controller that can evaluate the each request base on ad-hoc data table, if user is authenticated system can provide the access to specific user. Besides, by proficiently joining the customary multi-power plan with system, system build a half and half one, which fulfils the situation of traits originating from various powers and accomplishing security and framework level strength. The network security mechanism also fulfil with this approach, the system has evaluate on physical network environment with 2 to 4 physical devices and got satisfactory results than existing TMACS
Reference :
-
- Wei Li, KaipingXue, YingjieXue, and Jianan Hong, TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage, IEEE Transactions on parallel and distributed systems, VOL.24, NO. 06, October 2016.
- K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, DAC-MACS: Effective data access control for multiauthority cloud storage systems, 2013 Proceedings IEEE INFOCOM Year: 2013. OR Jianan Hong; Kaiping Xue; Wei Li Comments on DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems/Security Analysis of Attribute Revocation in
- Multiauthority Data Access Control for Cloud Storage Systems IEEE Transactions on Information Forensics and Security, Year: 2015, Volume: 10, Issue: 6
- Taeho Jung, Xiang-Yang Li, Zhiguo Wan, and Meng Wan, Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption, IEEE transactions on information forensics and security, VOL. 10, NO. 01, January 2015.
- Kan Yang and XiaohuaJia, Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage, IEEE Transactions on parallel and distributed systems, VOL. 25, NO. 07, July 2014.
- S. Kamara and K. Lauter, ”Cryptographic cloud storage,” in Proceedings of the 14th Financial Cryptography and Data Security.Springer, 2010, pp. 136- 149. [6] R.Ostrovsky, A. Sahai, and B.Waters, ”Attributebased encryption with nonmonotonic access structures,” in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2014, pp. 195-203.
- W. Xia, Y. Wen, C. Heng Foh, D. Niyato, and H. Xie, A survey on software-defined networking, IEEE Communications Surveys and Tutorials, vol. 17, no. 1, pp. 2751, 2015. View at Publisher View at Google Scholar View at Scopus
- Hideaki Ishii, Roberto Tempo, and Er-Wei Bai, Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud, IEEE Transac-tions on parallel and distributed systems, VOL. 24, NO. 06, June 2013.
- M. Chase and S. Chow, Improving privacy and security in multi authority attribute-based encryption, in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 121130.
- Mohamed Nabeel and Elisa Bertino, Fellow, IEEE, PrivacyPreserving Delegated Access Control in Public Clouds, IEEE Transactions on Knowledge and Data Engineering, Vol. 26, Issue 9, pp.2268-2280, 2014
- Z. Liu and Z. Cao, ”On efficiently transferring the linear secret sharing scheme matrix in ciphertextpolicy attribute-based encryption,” IACR Cryptology ePrint Archive, vol. 2010, p. 374, 2010.
- S. Patil, P. Vhatkar, and J. Gajwani, ”Towards secure and dependable storage services in cloud computing,” International Journal of Innovative Research in Advanced Engineering, vol. 1, no. 9, pp. 57-64, 2014.
- N. Attrapadung, B. Libert, and E. Panaeu, ”Expressive key policy attribute based encryption with constant-size ciphertexts,” in Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography. Springer, 2011, pp. 90 108.
- Luca Ferretti, Michele Colajanni, and MircoMarchetti, Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, Issue 2, pp.437-446,2014
- Open Networking Foundation (ONF),http://https://www.opennetworking.org/