Efficient Access Control for Security of Cloud Storage Systems Using RNS Cryptography

Authors

  • B. NVSK Gayathri  Student, Department of MCA, , Lakireddy Balireddy Engineering College, Mylavaram, Andhra Pradesh, India
  • G. Rajendra  Associate Prof, Department of MCA, , Lakireddy Balireddy Engineering College, Mylavaram, Andhra Pradesh, India

Keywords:

Attribute-based encryption, two-factor protection, user-level revocation

Abstract

Developing highlights of the distributed storage administrations empowers information proprietors to store their huge information in the cloud and give the information access to the clients. As protection and security of the cloud server isn't guaranteed, an Attribute-Based Encryption (ABE) a promising strategy for information get to control in distributed storage is used in this undertaking. Trait based encryption, particularly for cipher text arrangement quality based encryption, can satisfy the usefulness of fine-grained get to control in distributed storage frameworks. In the proposed conspire, any client can recuperate the outsourced information if and just if this client holds adequate trait mystery keys as for the entrance strategy and approval enter as to the outsourced information. Both the extent of cipher text and the quantity of matching tasks in decoding are consistent, which diminish the communication overhead and algorithm cost of the framework. Residue Number Systems (RNS) are valuable for dispersing vast dynamic range algorithms over little measured rings, which permits the accelerate of algorithms. RNS algorithm will be utilized for the encryption and unscrambling process included, which can be utilized to accomplish performance change as the number-crunching includes littler numbers and should be possible in parallel. This guarantees the framework is quick, most solid and is executed with the minimum computational expenses.

References

  1. Jiguo Li, Wei Yao, Jinguang Han, Member, IEEE, Yichen Zhang, and JianShen, "User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage", IEEE SYSTEMS JOURNAL, 2017.
  2. Pranayanath Reddy Anantula1, 2Dr G Manoj Someswar, "Preserving privacy in Cloud based applications using two-factor authentication (TOTP/WTP)," IJARCCE, Vol. 5, Issue 12, December 2016.
  3. Joseph K. Liu, Man Ho Au_, Xinyi Huang, Rongxing Lu, Jin Li, "Fine-grained Two-factor Access Control for Web-based Cloud Computing Services" IEEE Transactions on Information Forensics and Security,2017.
  4. Boyang Wang, Student Member, IEEE, Baochun Li, Senior Member, IEEE, and Hui Li, Member, IEEE, "Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud," IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015.
  5. W. Lou ,K. Ren,C. Wang and S. Yu (2010) "Achieving secure, scalable, and fine-grained data access control in cloud computing," in INFOCOM’10, IEEE, vol. 4, no. 9, pp. 534–542. 6Guojun Wang, Jie Wu and Qin Liu (2010) "Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services’’, vol. 11, no. 6,pp. 113–156.
  6. ShashankAgrawal, ShwetaAgrawal, SaikrishnaBadrinarayanan(2009) "On the Practical Security of Inner Product Functional Encryption", vol. 14, no. 9, pp. 241–310.
  7. AmitSahai ,Allison Lewko and Tatsuaki Okamoto (2009) "Fully Secure Functional Encryption: AttributeBased Encryption and Hierarchical Inner Product Encryption", vol. 8, no. 21,pp. 564–642.
  8. A. Beimel(2009) "Secure schemes for secret sharing and key distribution" DSc dissertation, vol. 16, no. 21,pp. 794–948.
  9. Ferraiolo DF and Kuhun DR. 1992. Role Based Access Control. Proceeding of 15th National Computer Security Conference, Baltimore MD. pp. 554-563.
  10. R. Lehtinen, D. Russell and G. Gangemi Sr. 2006. Computer Security Basics. O Reilly publications, 2nd edition.
  11. M. Blaze and J Feigenbaum et al. The Keynote trust management system. Version 2, IETF RFC 270.
  12. Zechao Liu , Zoe L. Jiang , Xuan Wang, S.M. Yiu§, ChunkaiZhang andXiaomeng Zhao, Fellow, IEEE, "Dynamic Attribute-Based Access Control in Cloud Storage Systems", 2016 IEEE TrustCom/BigDataSE/ISPA
  13. BO LANG, (Member, IEEE), JINMIAO WANG, AND YANXI LIU, "Achieving Flexible and Self-Contained Data Protection in Cloud Computing," IEEE Access Journal., date of publication February 7, 2017.
  14. Hui Ma_, Rui Zhang_, Zhiguo Wan, Yao Lu and Suqing Lin, "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing," IEEE Trans.Knowl. Dependable and Secure Computing, 2015.
  15. Jianghong Wei, Wenfen Liu, and Xuexian Hu "Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storagein" IEEE SYSTEMS JOURNAL,2016.
  16. KaipingXue, Senior Member, IEEE, YingjieXue, Jianan Hong, Wei Li, Hao Yue, Member, IEEE, David S.L. Wei, Senior Member, IEEE, and Peilin Hong, "RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage," IEEE Transactions on Information Forensics and Security,2017.
  17. Saraswati Gore1, Ashokkumar Kalal2, "A Survey on Fine-Grained Two-Factor Access Control for Web- Based Cloud Computing Services" International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 10, October 2016.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
B. NVSK Gayathri, G. Rajendra, " Efficient Access Control for Security of Cloud Storage Systems Using RNS Cryptography, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.395-402, March-April-2018.