Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

SECURE AND REVOCABLE DATA ACCESS CONTROL FOR MULTI-AUTHORITY CLOUD STORAGE

Author : R.Devendran 1 K.Ganeshnathan 2 D.Yukeshkumar 3 Mrs.K.Amsavalli 4

Date of Publication :7th March 2015

Abstract: Data access control is an effective way to ensure the data security in the cloud. Due to un trusted cloud servers and data outsourcing, the data access control becomes a challenging issue in cloud storage system. Cipher textPolicy Attribute based Encryption is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners to more direct control on access policies. However, it is difficult to directly apply the existing CPABE schemes to data access control in cloud storage system, because of the attribute revocation problem. In this paper, we design secure and revocable data access control for multi-authority cloud storage system and also it will efficient and effective cloud storage system. Were there are multiple authorities co-exist and each authority is able to issue attribute independently. Specifically, we propose most suitable encryption is called hybrid encryption method and it has two types of different encryption algorithm one is the most suitable of AES algorithm and another one is the jasypt algorithm, It will give more security in the cloud storage system and a revocable multi- authority CP-ABE scheme, and applying it as the underlying technique to design the data access control scheme. Our attribute revocation method and hybrid encryption method can efficiently achieve both forward and backward security and secure storage system. The analysis and simulation results show that our proposed data access control scheme is secure in the random oracle model and it is more secure and efficient than previous work.

Reference :

    1. kan yang and xiaohua jia “Expressive and efficient and revocable data access control for multi- authority cloud storage” IEEE transaction on parallel and distributed system. July 2014
    2. P. Mell and T. Grance, „„The NIST Definition of Cloud Computing,‟‟ National Institute of Standards and Technology, Gaithersburg, MD, USA, Tech. Rep., 2009
    3. J. Bethencourt, A. Sahai, and B. Waters, „„Cipher text-Policy Attribute-Based ,‟‟ in Proc. IEEE Symp. Security and privacy (S&P‟07), 2007, pp. 321-334.
    4. B. Waters, „„Cipher text-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,‟‟ in Proc. 4th Int‟l Conf. Practice and Theory in Public Key Cryptography (PKC‟11), 2011, pp. 53-70.
    5. V. Goyal, A. Jain,O. Pandey, andA. Sahai, „„Bounded Cipher text Policy Attribute Based Encryption,‟‟ in Proc. 35th Int‟l Colloquium on Automata, Languages, and Programming (ICALP‟08), 2008, pp. 579-591.
    6. A.B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B.Waters, „„Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption,‟‟ in Proc. Advances in Cryptology-EUROCRYPT‟10, 2010, pp. 62-91.
    7. M. Chase, „„Multi-Authority Attribute Based Encryption,‟‟ in Proc. 4th Theory of Cryptography Conf. Theory of Cryptography (TCC‟07), 2007, pp.
    8. M. Chase and S.S.M. Chow, „„Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,‟‟ in Proc. 16 th ACM Conf. Computer and Comm. Security (CCS‟09), 2009, pp. 121-130.
    9. A.B. Lewko and B. Waters, „„Decentralizing Attribute-Based Encryption,‟‟ in Proc. Advances in Cryptology-EUROCRYPT‟11, 2011, pp. 568-588.
    10. S. Yu, C. Wang, K. Ren, and W. Lou, „„Attribute Based Data Sharing with Attribute Revocation,‟‟ in Proc. 5th ACM Symp. Information, Computer and Comm. Security (ASIACCS‟10), 2010, pp. 261-270.
    11. M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, „„Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,‟‟ IEEE Trans. Parallel Distributed Systems, vol. 24, no. 1, pp. 131-143, Jan. 2013.
    12. J. Hur and D.K. Noh, „„Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,‟‟ IEEE Trans. Parallel Distributed Systems, vol. 22, no. 7, pp. 1214-1221, Julj,2011
    13. S. Jahid, P. Mittal, and N. Borisov, „„Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation,‟‟ in Proc. 6th ACM Symp. Information, Computer and Comm. Security (ASIACCS‟11), 2011, pp. 411-415.
    14. S. Ruj, A. Nayak, and I. Stojmenovic, „„DACC: Distributed Access Control in Clouds,‟‟ in Proc. 10th IEEE Int‟l Conf. TrustCom, 2011, pp. 91-98.
    15. K. Yang and X. Jia, „„Attribute-Based Access Control for Multi-Authority Systems in Cloud Storage,‟‟ in Proc. 32th IEEE Int‟l Conf. Distributed Computing Systems (ICDCS‟12), 2012, pp. 1-10
    16. D. Boneh and M.K. Franklin, „„Identity-Based Encryption from the Weil Pairing,‟‟ in Proc. 21st Ann. Int‟l Cryptology Conf.: Advances in Cryptology- CRYPTO‟01, 2001, pp. 213-229. 
    17. A.B. Lewko and B. Waters, „„New Proof Methods for Attribute- Based Encryption: Achieving Full Security through Selective Techniques,‟‟ in Proc. 32st Ann. Int‟l Cryptology Conf.: Advances in Cryptology - CRYPTO‟12, 2012, pp. 180-198

Recent Article