Improvement of Privacy and Security in Hybrid Cloud with Attribute Group Based Access Control

Authors

  • Kayalvili S  Computer Science and Engineering, Velalar College of Engineering and Technology, Erode, Tamilnadu, India
  • Sowmitha V  ME-CSE, Velalar College of Engineering and Technology, Erode, Tamilnadu, India

DOI:

https://doi.org//10.32628/CSEIT19518

Keywords:

ABE-Attribute Based Encryption, Authority, Fine Grained, Outsourcing, Dual Encryption.

Abstract

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.

References

  1. S. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "A Data Outsourcing Architecture Combining Cryptography and Access Control," Proc. ACM Workshop Computer Security Architec-ture (CSAW ’07), Nov. 2007.
  2. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, "Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application," Proc. Int’l Workshop Information Security Applications (WISA ’09), pp. 309-323, 2009.
  3. R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin,"Persona: An Online Social Network with User-Defined Privacy,"Proc. ACM SIGCOMM ’09, Aug. 2009.
  4. A. Sahai and B. Waters, "Fuzzy Identity-Based Encryption," Proc.Eurocrypt ’05, pp. 457-473, 2005.
  5. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-BasedEncryption for Fine-Grained Access Control of Encrypted Data," Proc. ACM Conf. Computer and Comm. Security, pp. 89-98, 2006.
  6. J. Anderson. Computer security planning study.Technical Rep ort 73-51, Air Force Electronic System Division, 1972.
  7. J. Saltzer and M. Schro eder. The protection of information in computer systems. Communications of the ACM , 17(7), July 1974.
  8. N. Provos . Encrypting virtual memory. In Proc. of the 9th USENIX Security Symposium , Denver, Colorado, USA, August 2000.
  9. A. Harrington and C. Jensen. Cryptographic access control in a distributed ¯le system. In Proc. of the 8th SACMAT , Como, Italy, June 2003.
  10. S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM TOCS , 1(3):239{248, August 1983. Germany, Septemb er 2007.
  11. J. Crampton, K. Martin, and P. Wild. On key assignment for hierarchical access control. In Proc. of the 19th IEEE CSFW'06 , Venice, Italy, July 2006.
  12.  G. Miklau and D. Suciu. Controlling access to published data using cryptography. In Proc. of the 29th VLDB Conference , Berlin, Germany, Septemb er 2003.
  13. H. Hacig Aum Aus, B. Iyer, and S. Mehrotra. Providing database as a service. In Proc. of 18th ICDE , San Jose, CA, USA, February 2002.

Downloads

Published

2019-01-30

Issue

Section

Research Articles

How to Cite

[1]
Kayalvili S, Sowmitha V, " Improvement of Privacy and Security in Hybrid Cloud with Attribute Group Based Access Control, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.57-62, January-February-2019. Available at doi : https://doi.org/10.32628/CSEIT19518