Key Management Scheme based on the Attribute-Based Encryption for Sensor Networks

Authors(2) :-Bhattu Harikrishna, Dr. V. B. Narashima

Time and Trend has its own way of approach to the technological research. Recently, Information Technology and its implication play the most important role in the village area for the context of the taking consideration to industry of information data provenance needs to be secured since it may reveal private information about the sensitive data while the cloud service provider does not guarantee confidentiality of the data stored in dispersed geographical locations. Therefore, in addition to provide protection to the sensitive data, it is vital to make the data provenance secure. Another motivation to secure data provenance is for providing the enforceability and non-repudiation. The method investigates the problem of securing data provenance in the cloud and proposes a scheme that supports encrypted search while protecting confidentiality of data provenance stored in the cloud. In the proposed method, we consider a cloud data system consisting of data owners, data users, cloud server and third-party auditor. Initially the proposed method has three phases namely setup phase, key generation phase and storage phase. At first setup phase the data owner is reveal their information. Next key generation phase, in this phase the data owner get their key. If the data owner stores the sensitive data to cloud server, the data owner is encrypt their document in our proposed method we use double encryption technique to encrypt the user document. Here RSA and Blowfish algorithm is used to encrypt the document with high security. After the encryption the document stored in the cloud along with an access structure that specifies which types of user are allowed to access the document.

Authors and Affiliations

Bhattu Harikrishna
Research Scholar, Department of Computer Science, University college of Engineering, Osmania University, Hydrabad, Telagana, India
Dr. V. B. Narashima
Assitant Professor, Department of Computer Science, University college of Engineering, Osmania University, Hydrabad, Telagana, India

Attribute-Based Encryption, Access Control, Outsourcing Computation, Key Issuing, Communication Cost Distribution, Optimized Matrix

  1. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing," Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
  2. S. Kamara and K. Lauter, "Cryptographic Cloud Storage," Proc.Int’l Conf. Financial Cryptography and Data Security (FC), pp. 136-149, Jan. 2010.
  3. S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing," Proc. IEEE INFOCOM, pp. 534-542, 2010.
  4. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable Secure File Sharing on Untrusted Storage," Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.
  5. E. Goh, H. Shacham, N. Modadugu, and D. Boneh, "Sirius: Securing Remote Untrusted Storage," Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145, 2003.
  6. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage," Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 29-43, 2005.
  7. R. Lu, X. Lin, X. Liang, and X. Shen, "Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing," Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010.
  8. B. Waters, "Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization," Proc. Int’l Conf. Practice and Theory in Public Key Cryptography Conf. Public Key Cryptography, http://eprint.iacr.org/2008/290.pdf, 2008.
  9. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data," Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 89-98, 2006.
  10. D. Naor, M. Naor, and J.B. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," Proc. Ann. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 41-62, 2001.
  11. D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 213-229, 2001.
  12. D. Boneh, X. Boyen, and H. Shacham, "Short Group Signature," Proc. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 41-55, 2004.

Publication Details

Published in : Volume 3 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 400-402
Manuscript Number : CSEIT1831101
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Bhattu Harikrishna, Dr. V. B. Narashima, "Key Management Scheme based on the Attribute-Based Encryption for Sensor Networks", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.400-402, January-February-2018.
Journal URL : http://ijsrcseit.com/CSEIT1831101

Article Preview