Improvement of Privacy and Security in Hybrid Cloud with Attribute Group Based Access Control

Authors(2) :-Kayalvili S, Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.

Authors and Affiliations

Kayalvili S
Computer Science and Engineering, Velalar College of Engineering and Technology, Erode, Tamilnadu, India
Sowmitha V
ME-CSE, Velalar College of Engineering and Technology, Erode, Tamilnadu, India

ABE-Attribute Based Encryption, Authority, Fine Grained, Outsourcing, Dual Encryption.

  1. S. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "A Data Outsourcing Architecture Combining Cryptography and Access Control," Proc. ACM Workshop Computer Security Architec-ture (CSAW ’07), Nov. 2007.
  2. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, "Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application," Proc. Int’l Workshop Information Security Applications (WISA ’09), pp. 309-323, 2009.
  3. R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin,"Persona: An Online Social Network with User-Defined Privacy,"Proc. ACM SIGCOMM ’09, Aug. 2009.
  4. A. Sahai and B. Waters, "Fuzzy Identity-Based Encryption," Proc.Eurocrypt ’05, pp. 457-473, 2005.
  5. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-BasedEncryption for Fine-Grained Access Control of Encrypted Data," Proc. ACM Conf. Computer and Comm. Security, pp. 89-98, 2006.
  6. J. Anderson. Computer security planning study.Technical Rep ort 73-51, Air Force Electronic System Division, 1972.
  7. J. Saltzer and M. Schro eder. The protection of information in computer systems. Communications of the ACM , 17(7), July 1974.
  8. N. Provos . Encrypting virtual memory. In Proc. of the 9th USENIX Security Symposium , Denver, Colorado, USA, August 2000.
  9. A. Harrington and C. Jensen. Cryptographic access control in a distributed ¯le system. In Proc. of the 8th SACMAT , Como, Italy, June 2003.
  10. S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM TOCS , 1(3):239{248, August 1983. Germany, Septemb er 2007.
  11. J. Crampton, K. Martin, and P. Wild. On key assignment for hierarchical access control. In Proc. of the 19th IEEE CSFW'06 , Venice, Italy, July 2006.
  12.  G. Miklau and D. Suciu. Controlling access to published data using cryptography. In Proc. of the 29th VLDB Conference , Berlin, Germany, Septemb er 2003.
  13. H. Hacig Aum Aus, B. Iyer, and S. Mehrotra. Providing database as a service. In Proc. of 18th ICDE , San Jose, CA, USA, February 2002.

Publication Details

Published in : Volume 5 | Issue 1 | January-February 2019
Date of Publication : 2019-01-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 57-62
Manuscript Number : CSEIT19518
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Kayalvili S, Sowmitha V, "Improvement of Privacy and Security in Hybrid Cloud with Attribute Group Based Access Control", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.57-62, January-February-2019. Available at doi : https://doi.org/10.32628/CSEIT19518
Journal URL : http://ijsrcseit.com/CSEIT19518

Article Preview