Enhanced Secure Data Sharing Over Cloud Using ABE Algorithm

Authors

  • Virangni Gaikwad  Student, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan, Savitribai Phule Pune University, Pune, Maharashtra, India
  • Ekta Bhosale  Student, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan, Savitribai Phule Pune University, Pune, Maharashtra, India
  • Ankita Istalkar  Student, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan, Savitribai Phule Pune University, Pune, Maharashtra, India
  • Rajashri Tapkir  Student, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan, Savitribai Phule Pune University, Pune, Maharashtra, India
  • Prof. Sachin Patil  Professor, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan, Savitribai Phule Pune University, Pune, Maharashtra, India

Keywords:

Cloud computing, CP, ABE, Encryption, Decryption, Privacy preserving.

Abstract

Cloud Computing provides a convenient way of sharing of data, which brings various benefits for both the society and individuals. Security is becoming a wide necessity in day-to-day life. Data security is the most obliged security of all. The data in our system is opened to high potential risks. Due to many security reasons we adopt diverse methods. Now everyone is being dependent on the cloud platform for security and storage but even it is vulnerable to various threats. The data inside cloud is not well-secured as it can be accessed by anyone who would have our credentials. But there exists a resistance for users to directly outsource the shared data to the cloud server as the data often contains valuable information. So we propose an Enhanced Security to the data using encryption- The ciphertext-policy (CP) attribute-based encryption (ABE) (CP-ABE) and Byte Rotation Algorithm emerging as a promising technology for allowing users to conveniently access data in cloud computing, giving security to outsourced information, while thinking that client is not stressed while transferring their classified information. Moreover, the privacy of users are protected in this scheme. The security and performance analysis shows the scheme is secure, efficient and privacy-preserving.

References

  1. Auditing and Resisting Key Exposure on Cloud Storage Akshata M. Bhand, D. A. Meshram Student, ME (IT) , RMD Sinhgad School of Engineering,Pune, Assistant Professor, ME (IT), RMD Sinhgad School of Engineering, Pune,2017
  2. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage Jia Yu, and Huaqun Wang - IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. , NO., 2016
  3. Enabling Cloud Storage Auditing with Key- Exposure Resistance Jia Yu, Kui Ren, Senior Member, IEEE, Cong Wang, Member, IEEE and Vijay Varadharajan, Senior Member, IEEE , IEEE.
  4. Analysis of multi-threading time metric on single and multi-core CPUs with Matrix multiplication Dhruva R. Rinku, Dr. M Asha Rani 3rd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB17)
  5. V. Maitri, Dattatray S. Waghole, Vivek S. Deshpande, IEEE Senior Member, \Low latency for _le encryption and decryption using BRA algorithm in network security", 2015 International Conference on Pervasive computing.

Downloads

Published

2019-10-30

Issue

Section

Research Articles

How to Cite

[1]
Virangni Gaikwad, Ekta Bhosale, Ankita Istalkar, Rajashri Tapkir, Prof. Sachin Patil, " Enhanced Secure Data Sharing Over Cloud Using ABE Algorithm, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 8, pp.125-128, September-October-2019.