Privacy Procuring Legitimate Key Switch Over Protocol in Public Clouds with Two Layer Encoding

Authors(2) :-Sasikala B, P. V. Ramesh

Distributed computing is a rising figuring innovation. It grants clients, store their information, learning or data remotly. The motivation behind this paper is to secure access control conspire for open mists. We introduce a "Security Preserving Two Layer Encryption Access control in Public Clouds", Which gives greater security and protection as contrast with the custom approaches. Current ways to deal with authorize get to administration polices(ACPs) on outsourced information utilizing chose encryption expect associations to deals with all keys and encryptions and transfer scrambled information on the remote stockpiling. Such sort of methodologies acquire high correspondences and the calculation cost to oversee keys and encryptions at whatever point client roll out improvements. To taking care of this issue by assigning as a significant part of the Access Control requirement obligations as conceivable to the cloud while lessening the data presentation hazard because of intriguing clients and Cloud.

Authors and Affiliations

Sasikala B
Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India
P. V. Ramesh
Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India

Distributed computing, encryption, Security Preserving Two Layer

  1. G.Ateniese, R. Burns, R.urtmola, J.Herring, L. Kissner, Z. Peterson, and D.Song, "Deduplication in cloud storage using side channels in cloud services," Oct 2008.
  2. D. Boneh, X. Boyen, and E. Goh, "Hierarchical Identity Based Encryption with Constant Size Ciphertext," Proc. Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp. 440-456, 2005.
  3. K. D. Bowers, A. Juels, and A. Oprea, "Hail: A highavailability and integrity layer for cloud storage," in Proc. Of CCS’09, 2009, pp. 187-198.4A. Fiat and M. Naor, "Broadcast Encryption," Proc. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 480-491, 1993.
  4. S. Kamara and K. Lauter, "Cryptographic Cloud Storage," Proc. Intl Conf. Financial Cryptography and Data Security (FC), pp. 136-149, Jan. 2010.
  5. E. Goh, H. Shacham, N. Modadugu, and D. Boneh, "Sirius: Securing Remote Untrusted Storage," Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131- 145, 2003.
  6. A. Fiat and M. Naor, "Broadcast Encryption," Proc. IntlCryptology Conf. Advances in Cryptology (CRYPTO), pp. 480-491, 1993.
  7. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing," Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
  8. X.Liu,B.Wang,Y.Zhang, and J.Yan,"Mona: Secure MultiOwner Data Sharing for Dynamic Groups in the Cloud,"IEEE Computer Society,vol. 24,no. 6,June. 2013.
  9. M. Nabeel and E. Bertino, "Privacy preserving delegated access control in the storage as a service model," in EEE International Conference on Information Reuse and Integration (IRI), 2012.
  10. E. Bertino and E. Ferrari, "Secure and selective dissemination of XML documents," ACM Trans. Inf. Syst. Secur., vol. 5, no. 3, pp. 290-331, 2002.
  11. G. Miklau and D. Suciu, "Controlling access to published data using cryptography," in VLDB ’2003: Proceedings of the 29th international conference on Very large data bases. VLDB Endowment, 2003, pp. 898-909.
  12. N. Shang, M. Nabeel, F. Paci, and E. Bertino, "A privacy-preserving approach to policy-based content dissemination," in ICDE ’10: Proceedings of the 2010 IEEE 26th International Conference on Data Engineering, 2010.
  13. M. Nabeel, E. Bertino, M. Kantarcioglu, and B. M. Thuraisingham, "Towards privacy preserving access control in the cloud," in Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, ser. CollaborateCom 11, 2011, pp. 172-180.15]M.Nabeel,N.Shang,andE.Bertino,"Privacypreservingpolic y based content sharing inpublic clouds," IEEE Transactions on Knowledge and Data Engineering, 2012. 14
  14. S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over-encryption: Management of access control evolution on outsourced data," in Proceedings of the 33rdInternationalConferenceonVeryLarge DataBases, ser.VLDB 07. VLDB Endowment, 2007, pp. 123-134.
  15. M. Nabeel and E. Bertino, "Towards attribute based group key management," in Proceedings of the 18th ACM conference on Computer and communications security, Chicago, Illinois, USA, 2011.

Publication Details

Published in : Volume 4 | Issue 2 | March-April 2018
Date of Publication : 2018-03-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 425-428
Manuscript Number : CSEIT184114
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Sasikala B, P. V. Ramesh, "Privacy Procuring Legitimate Key Switch Over Protocol in Public Clouds with Two Layer Encoding", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.425-428, March-April-2018.
Journal URL :

Article Preview

Follow Us

Contact Us