Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Data Storage Security and Access Privilege Control in Cloud using Server Aided Attribute Based Encryption

Author : Ashish S 1 Sarala S M 2

Date of Publication :7th May 2016

Abstract: Cloud computing technique is a new and precise data storage and access technology, in which the dynamic sharing of resources of the computer takes place dynamically via the Internet. This technology has gathered a remarkable amount of attention from educational and research institutes and industry. This computing virtualization enables flexible and low cost computing thus enabling it to be outsourced to the cloud servers thus making privacy a least concern. Although various schemes have been put forward to overcome the issue of privacy and safeguarding its information, it is quite understandable that the users of cloud would want to keep their identities private, and to review privilege control while they still get their privacy and so accessing this information should not cause reentrancy and an overhead during the communication. This paper, discusses a scheme for control on a semi-anonymous privilege scheme which ensures to address both data privacy and privacy of the user identity. Server Aided Cipher-text policy works by the principle that decentralizing the control authority will lessen the probability of the identity leakage and in this way it helps to achieve semi -anonymity. The data is encrypted in two hierarchies one credential uses AES encryption which occurs at the local slot and one in the medium with server host, SA-CPABE technique is used to accomplish this task.

Reference :

  1. [1] Shamir, “Identity-based cryptosystems and signature schemes,” in CRYPTO. Springer, 1985, pp. 47–53.

    [2] John Bethencourt, Amit Sahai “Cipher-text-Policy Attribute-Based Encryption”, IEEE, PP. 1-8, 2007.

    [3] Bhuvaneswari Thangara” FAC-MACS: Fortified Access Control for Multi-Authority Cloud Storage Using CPABE”,Volume 4, Issue 2, March-April 2015

    [4] Taeho Jung” Privacy Preserving Cloud Data Access With Multi-Authorities”, arXiv: 1206.2657v6 [cs.CR] 11Apr 2013.

    [5] Zhang, “Separable Reversible Data Hiding in Encrypted Image” IEEE Trans.Inform. Forensics Security, vol. 7, no. 2, pp. 826-832, April 2012

    [6] Taeho Jung” Privacy Preserving Cloud Data Access With Multi-Authorities”, arXiv: 1206.2657v6 [cs.CR] 11Apr 2013.


Recent Article