Strong and Agitable Access Control with Multiple Feature Authorities for Public Cloud Storage

Authors

  • Dildar Basha. K  Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India
  • S. A. Md. Noorulla Baig  Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India

Keywords:

Cloud storage, Access control, Auditing, CPABE.

Abstract

Information get to control is a testing issue out in the open distributed storage frameworks. Cipher text-Policy Attribute-Based Encryption (CP-ABE) has been received as a promising procedure to give ?exible, ?ne-grained and secure information get to control for cloud storage with honest-however curious cloud servers. However, in the current CP-ABE plans, the single property expert must execute the tedious client authenticity veri?cation and mystery key circulation, and subsequently it brings about a solitary point execution bottleneck when a CP-ABE plot is embraced in a huge scale distributed storage framework. Clients might be stuck in the sitting tight line for a long stretch to get their mystery keys, consequently bringing about low-ef?ciency of the framework. In spite of the fact that multi authority get to control plans have been proposed, these plans still can't defeat the downsides of single-point bottleneck and low ef?ciency, because of the way that every one of the specialists still freely deals with a disjoint property set. In this paper, we propose a novel heterogeneous structure to evacuate the issue of single-point execution bottleneck and give a more ef?cient get to control plot with an evaluating instrument. Our structure utilizes different credit experts to share the heap of client authenticity veri?cation. In the interim, in our scheme, a CA(Central Authority)is introduced to generate mystery keys for authenticity veri?ed clients. Dissimilar to other multi authority get to control conspires, every one of the experts in our plan deals with the entire characteristic set separately. To improve security, we additionally propose a reviewing system to recognize which AA (Attribute Authority) has erroneously or malignantly played out the authenticity veri?cation technique. Investigation indicates that our system not only guarantees these curity requirements but additionally makes awesome execution change on key generation.

References

  1. P. Mell and T. Grance, "The NIST definition of cloud computing," National Institute of Standards and Technology Gaithersburg, 2011.
  2. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement," IEEE Transactions on Parallel & Distributed Systems, vol. 27, no. 9, pp. 2546–2559, 2016.
  3. Z. Fu, X. Sun, S. Ji, and G. Xie, "Towards efficient content-aware search over encrypted outsourced data in cloud," in in Proceedings of 2016 IEEE Conference on Computer Communications (INFOCOM 2016). IEEE, 2016, pp. 1–9.
  4. K. Xue and P. Hong, "A dynamic secure group sharing framework in public cloud computing," IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 459–470, 2014.
  5. Y. Wu, Z. Wei, and H. Deng, "Attribute-based access to scalable media in cloud-assisted content sharing," IEEE Transactions on Multimedia, vol. 15, no. 4, pp. 778–788, 2013.
  6. J. Hur, "Improving security and efficiency in attribute based data sharing," IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 10, pp. 2271–2282, 2013.
  7. J. Hur and D. K. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214–1221, 2011.
  8. J. Hong, K. Xue, W. Li, and Y. Xue, "TAFC: Time and attribute factors combined access control on time sensitive data in public cloud," in Proceedings of 2015 IEEE Global Communications Conference (GLOBECOM 2015). IEEE, 2015, pp. 6.
  9. Y. Xue, J. Hong, W. Li, K. Xue, and P. Hong, "LABAC: A location-aware attribute-based access control scheme for cloud storage," in Proceedings of 2016 IEEE Global Communications Conference (GLOBECOM 2016). IEEE, 2016, pp. 1–6.
  10. A.Lewko and B. Waters, "Decentralizing attribute-based encryption," in Advances Cryptology–EUROCRYPT 2011. Springer, 2011, pp. 568–588

Downloads

Published

2018-03-31

Issue

Section

Research Articles

How to Cite

[1]
Dildar Basha. K, S. A. Md. Noorulla Baig, " Strong and Agitable Access Control with Multiple Feature Authorities for Public Cloud Storage, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.452-459, March-April-2018.