An Overview of Data Access Control in Security for Multi authority Cloud Storage Systems

Authors(2) :-R. Nagarajan, Dr. G. Maria Priscilla

Cloud computing technologies get more importance with a high level in secure data access control in a semi-trusted cloud storage system. Data access control for multi authority cloud storage systems (DAC-MACS) is a beneficial way to ensure data security of the cloud storage system. The two main challenging issues of the current cloud storage systems are data outsourcing and untrusted cloud servers. However, cloud storage service separates the roles of the data owner from the data service provider, and the data owner does not interact with the user directly for providing data access service, which makes the data access control a challenging issue in cloud storage systems. Because the cloud server cannot be fully trusted by data owners, traditional server-based access control methods are no longer applicable to cloud storage systems. To prevent the untrusted servers from accessing sensitive data, traditional methods usually encrypt the data and only users holding valid keys can access the data. In this research work, survey is conducted towards the attacks on data access control scheme for multi-authority cloud storage system. The security improvements of secret key generation and attribute revocation in data access control scheme to be corrected. Finally, the major overhead of decryption is also securely outsourced to the cloud servers, and the overall overheads of storage, communication and computation of the NEDAC-MACS are superior to that of DACC and relatively same as that of DAC-MACS. The analysed methodologies are implemented using the CloudSim toolkit, which is evaluated to know the performance of every research works. The performance evaluation conducted was proved that the each method has unique advantage and disadvantages among each other.

Authors and Affiliations

R. Nagarajan
Assistant Professor, Department of Computer Science, Sri Ramakrishna College of Arts and Science, Bharthiar University, Coimbatore, India
Dr. G. Maria Priscilla
Professor & Head, Department of Computer Science, Sri Ramakrishna College of Arts and Science, Bharthiar University, Coimbatore, India

Data Access Control (DAC), Cloud Storage, Attribute revocation, Attacks

  1. Lin,H. Y.,& Tzeng,W. G. (2012). A secure erasure code-based cloud storage system with secure data forwarding. IEEE transactions on parallel and distributed systems,23(6),995-1003.
  2. Goyal,V.,Pandey,O.,Sahai,A. and Waters,B. (2006) 'Attribute based encryption for fine-grained access control of encrypted data',Proceedings of the ACM Conference on Computer and Communications Security,CCS'06,Alexandria,VA.
  3. Bethencourt,J.,Sahai,A. and Water,B. (2007) 'Cipher text-policy attribute-based encryption',IEEE Symposium on Security and Privacy,SP'07,pp.321-334.
  4. Yu,S.,Wang,C.,Ren,K. and Lou,W. (2010) 'Achieving secure,scalable,and fine-grained data access control in cloud computing',Proceedings of the IEEE Conference on Computer Communications,INFOCOM'2010,pp.1-9
  5. Yang,K.,Jia,X.,Ren,K.,Zhang,B. and Xie,R. (2013) 'DACMACS: effective data access control for multi-authority cloud storage systems',IEEE Transaction on Information Forensics and Security,Vol. 8,No. 11.
  6. Li,X.,Tang,S.,Xu,L.,Wang,H.,& Chen,J. (2017). Two-factor data access control with efficient revocation for multi-authority cloud storage systems. IEEE Access,5,393-405.
  7. Wei Li,Kaiping Xue,Yingjie Xue,and Jianan Hong,"TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage”,IEEE Transactions on parallel and distributed systems,VOL.24,NO. 06,October 2015.
  8. Hong,J.,Xue,K.,& Li,W. (2015). Comments on "DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems”/Security Analysis of Attribute Revocation in Multiauthority Data Access Control for Cloud Storage Systems. IEEE Transactions on Information Forensics and Security,10(6),1315-1317.
  9. M. Green,S. Hohenberger,and B. Waters,"Outsourcing the decryption of abe ciphertexts,” in Proceedings of the 20th USENIX Security Symposium. USENIX Association,2011.
  10. Cheng-Kang Chu,Sherman S.M. Chow,Wen-Guey Tzeng,Jianying Zhou,and Robert H. Deng,"Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage”,IEEE Transactions on Parallel and Distributed Systems,Vol. 25,No. 2,February 2014
  11. Taeho Jung,Xiang-Yang Li,Zhiguo Wan,and Meng Wan,"Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption”,IEEE transactions on information forensics and security,VOL. 10,NO. 01,January 2015.
  12. X. Liu,Y. Zhang,B. Wang and J. Yan,"Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud," in IEEE Transactions on Parallel and Distributed Systems,vol. 24,no. 6,pp. 1182-1191,June 2013.
  13. Kan Yang and Xiaohua Jia,"Expressive,Efficient,and Revocable Data Access Control for Multi-Authority Cloud Storage”,IEEE Transactions on parallel and distributed systems,VOL. 25,NO. 07,July 2014.
  14. Sushmita Ruj,Milos Stojmenovic,Amiya Nayak,"Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”,IEEE Transactions On Parallel And Distributed Systems,Vol. 25,No. 2,February 2014.
  15. Wu,X.,Jiang,R.,& Bhargava,B. (2017). On the security of data access control for multiauthority cloud storage systems. IEEE Transactions on Services Computing,10(2),258-272.

Publication Details

Published in : Volume 3 | Issue 3 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1901-1910
Manuscript Number : CSEIT1833725
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

R. Nagarajan, Dr. G. Maria Priscilla, "An Overview of Data Access Control in Security for Multi authority Cloud Storage Systems", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.1901-1910, March-April-2018. |          | BibTeX | RIS | CSV

Article Preview