Author : Vratika Tiwari 1
Date of Publication :7th March 2016
Abstract: Cloud computing has developed as a standout amongst the most persuasive ideal models in the IT business as of late. Since this new registering innovation obliges clients to endow their important information to cloud suppliers, there have been expanding security and protection worries on outsourced information. A few plans utilizing quality attribute based encryption (ABE) have been proposed for access control of outsourced information in distributed computing; in any case, a large portion of them experience the ill effects of resoluteness in actualizing complex access control strategies. To acknowledge versatile, adaptable, and fine-grained access control of outsourced information in distributed computing, in this paper, we propose An Ascendable Aspect-Based Method (AABM) by developing ciphertext-approach with a various leveled structure of clients. The proposed plan not just accomplishes versatility because of its various leveled structure, additionally acquires adaptability and fine-grained access control in supporting compound properties of ASBE. Also, AABM utilizes numerous quality assignments for access termination time to manage client renouncement more effectively than existing plans. We formally demonstrate the security of AABM in view of security of the figure content approach property based encryption (CP-ABE) examines its execution and computational unpredictability. We execute our plan and demonstrate that it is both effective and adaptable in managing access control for outsourced information in distributed computing with complete investigations.
Reference :
-
- Zhiguo Wan, Jun’e Liu, and Robert H. Deng, “SABM: A Hierearchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing”, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, April 2014.
- T. Yu and M. Winslett, “A unified scheme for resource protection in automated trust negotiation,” in Proc. IEEE 2013
- G.Wang, Q. Liu, and J.Wu, “Hierachical attibutebased encryption for fine-grained access control in cloud storage services,” in Proc. ACM Conf. Computer and Communications Security(ACM CCS), Chicago,2011
- J. Li, N. Li, and W. H. Wins borough, “Automated trust negotiation using cryptographic credentials,” in Proc. ACMConf. Computer and Communications Security (CCS), Alexandria, VA, 2005
- Rakesh Bobba, Himanshu Khurana & Manoj Prabhakaran, “Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption” in University of Illinois at Urbana-Champaign, July 2009
- John Bethencourt, Amit Sahai & Brent Waters, “CiphertextPolicy Attribute-Based Encryption”, in NSF CNS-0524252 US Army Research, in 2009.
- A. Ross, “Technical perspective: A chilly sense of security,” Commun. ACM, vol. 52, pp. 90–90, 2009.
- D. E. Bell and L. J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation. The MITRE Corporation, Tech. Rep., 2010.
- K. J. Biba, Integrity Considerations for Secure Computer Systems The MITRE Corporation, Tech. Rep.2009
- H. Harney, A. Colgrove, and P. D. McDaniel, “Principles of policy in secure groups,” in Proc. NDSS, San Diego, CA, 2001.
- R. Bobba, H. Khurana, and M. Prabhakaran,“Attribute-sets: A practically motivated enhancement toattribute-based encryption,” in Proc.ESORICS, Saint Malo, France, 2009.
- A. Sahai and B. Waters, “Fuzzy identity based encryption,” in Proc. Acvancesin Cryptology—Eurocrypt, 2005, vol. 3494, LNCS, pp.457–473.