Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Secure Data Destruction In Fuzzy Authorization

Author : Arya Vijayan 1 Devi Dath 2

Date of Publication :7th February 2016

Abstract: Cloud computing is a new internet based computing technique that provides many services over internet. Many authorization methods are used to provide security and privacy of data in a cloud. OAuth is one of the most known authorization schemes but cannot be used in the case of heterogeneous clouds. So for the heterogeneous cloud environment Fuzzy Authorization scheme was proposed. This scheme helps in providing the facility for an application in one cloud to access an owner’s data that is in another cloud. This is a reading authorization scheme which uses OAuth and modified Ciphertext Policy-Attribute Based Encryption (CP-ABE). If the owner makes any changes in the data, the application’s right of accessing the data will be revoked automatically. More security can be given to this scheme by data self destruction method. The implementation is done by using CloudSim and cryptography part is done by Pairing Based Cryptographic(PBC)Library. The simulation result shows that the authorization scheme is more secure and efficient.

Reference :

    1. http://www.thetop10bestonlinebackup.com/cloudstorage,
    2. http://www.pdfmerge.com,
    3. A. Tassanaviboon and G. Gong, “Oauth and abe based authorization in semitrusted cloud computing,” in Proc. 2nd Int. Workshop Data Intensive Comput. Clouds
    4. A. J.Bethencourt and B.Waters, “Ciphertext policy attribute based encryption,” in IEEE Symposium on Security and Privacy, pp. 321–334, ACM, 2007.
    5. S. Zhu and G. Gong, “Fuzzy authorization for cloud storage,” in IEEE Transaction on Cloud Computing, pp. 422–436, IEEE, 2014.
    6. C. C. A. O. Michael Backes, “Secure key-updating for lazy revocation,” in Computer Security ESORICS, pp. 41–50, arXiv, 2006
    7. Jinbo Xiong , Patrick s chen,” A secure data self destructing scheme in cloud computing

Recent Article