Key Management Scheme based on the Attribute-Based Encryption for Sensor Networks

Authors

  • Bhattu Harikrishna  Research Scholar, Department of Computer Science, University college of Engineering, Osmania University, Hydrabad, Telagana, India
  • Dr. V. B. Narashima  Assitant Professor, Department of Computer Science, University college of Engineering, Osmania University, Hydrabad, Telagana, India

Keywords:

Attribute-Based Encryption, Access Control, Outsourcing Computation, Key Issuing, Communication Cost Distribution, Optimized Matrix

Abstract

Time and Trend has its own way of approach to the technological research. Recently, Information Technology and its implication play the most important role in the village area for the context of the taking consideration to industry of information data provenance needs to be secured since it may reveal private information about the sensitive data while the cloud service provider does not guarantee confidentiality of the data stored in dispersed geographical locations. Therefore, in addition to provide protection to the sensitive data, it is vital to make the data provenance secure. Another motivation to secure data provenance is for providing the enforceability and non-repudiation. The method investigates the problem of securing data provenance in the cloud and proposes a scheme that supports encrypted search while protecting confidentiality of data provenance stored in the cloud. In the proposed method, we consider a cloud data system consisting of data owners, data users, cloud server and third-party auditor. Initially the proposed method has three phases namely setup phase, key generation phase and storage phase. At first setup phase the data owner is reveal their information. Next key generation phase, in this phase the data owner get their key. If the data owner stores the sensitive data to cloud server, the data owner is encrypt their document in our proposed method we use double encryption technique to encrypt the user document. Here RSA and Blowfish algorithm is used to encrypt the document with high security. After the encryption the document stored in the cloud along with an access structure that specifies which types of user are allowed to access the document.

References

  1. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing," Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
  2. S. Kamara and K. Lauter, "Cryptographic Cloud Storage," Proc.Int’l Conf. Financial Cryptography and Data Security (FC), pp. 136-149, Jan. 2010.
  3. S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing," Proc. IEEE INFOCOM, pp. 534-542, 2010.
  4. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable Secure File Sharing on Untrusted Storage," Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.
  5. E. Goh, H. Shacham, N. Modadugu, and D. Boneh, "Sirius: Securing Remote Untrusted Storage," Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145, 2003.
  6. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage," Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 29-43, 2005.
  7. R. Lu, X. Lin, X. Liang, and X. Shen, "Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing," Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010.
  8. B. Waters, "Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization," Proc. Int’l Conf. Practice and Theory in Public Key Cryptography Conf. Public Key Cryptography, http://eprint.iacr.org/2008/290.pdf, 2008.
  9. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data," Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 89-98, 2006.
  10. D. Naor, M. Naor, and J.B. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," Proc. Ann. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 41-62, 2001.
  11. D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 213-229, 2001.
  12. D. Boneh, X. Boyen, and H. Shacham, "Short Group Signature," Proc. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 41-55, 2004.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Bhattu Harikrishna, Dr. V. B. Narashima, " Key Management Scheme based on the Attribute-Based Encryption for Sensor Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.400-402, January-February-2018.