Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Secure and verifiable policy update Outsourcing big data in cloud computing

Author : T.Divya 1 M.Thenmozhi 2 A.Vidhya 3 M.Karthikeyan 4

Date of Publication :23rd March 2018

Abstract: Due to the high volume and velocity of big data, it is an effective option to store big data in the cloud, as the cloud has capabilities of storing big data and processing high volume of user access requests. Attribute-Based Encryption (ABE) is a promising technique to ensure the end-to-end security of big data in the cloud. However, the policy updating has always been a challenging issue when ABE is used to construct access control schemes. A trivial implementation is to let data owners retrieve the data and re-encrypt it under the new access policy, and then send it back to the cloud. This method, however, incurs a high communication overhead and heavy computation burden on data owners. In this paper, we propose a novel scheme that enabling efficient access control with dynamic policy updating for big data in the cloud. We focus on developing an outsourced policy updating method for ABE systems. Our method can avoid the transmission of encrypted data and minimize the computation work of data owners, by making use of the previously encrypted data with old access policies. Moreover, we also propose policy updating algorithms for different types of access policies. Finally, we propose an efficient and secure method that allows data owner to check whether the cloud server has updated the cipher texts correctly. The analysis shows that our policy updating outsourcing scheme is correct, complete, secure and efficient

Reference :

    1. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine grained access control of encrypted data,” in CCS’06. ACM, 2006, pp. 89–98.
    2. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption,” in S&P’07. IEEE, 2007, pp. 321–334.
    3. B. Waters, “Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization,” in PKC’11. Springer, 2011,pp. 53–70.
    4. A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, “Fully secure functional encryption Attribute-based encryption and (hierarchical) inner product encryption,” in EUROCRYPT’10. Springer, 2010, pp. 62–91534–542.
    5. E. Damiani et al. 2010.New Paradigm for Access Control in Open Environment. Proceeding of 5th IEEE International Symposium on Signal Processing and Information.
    6. P. Bonatti and P. Samarati. 2012. A unified framework for regulating access and information release on the web. Journal of computer Security. 10(3): 241-272
    7. L. Wang, D. Wijesekera and S. Jajodia. 2014. A logic based framework for attribute based access control. Proceeding of ACM workshop on formal methods in Security Engineering. pp. 45-55, ACM press.

Recent Article