Security Model of Sharing Data for Privacy Protection and Performance-Based Outsource Data Sharing On Cloud

Authors

  • Merlin Mary James  Department of CSE, Mangalam College of Engineering, Kerala, India
  • Sujitha M  Department of CSE, Mangalam College of Engineering, Kerala, India
  • Simy Mary Kurian  Department of CSE, Mangalam College of Engineering, Kerala, India
  • Neena Joseph   Department of CSE, Mangalam College of Engineering, Kerala, India

Keywords:

Arduino, IoT, MQ-2 sensor

Abstract

The internet of things to uniquely recognized gadgets and their digital representations in an Internet-like shape. In this task, the primary aim is to stumble on gas line leakage in under pipeline through internet connectivity and monitoring it day by day In the proposed system, the robot continues moving alongside the metal pipe it maintains tracking for any gasoline leakage, on detection it makes use of an interface GPS sensor to transmit the region of the leakage detected we've a totally automatic insect-like a robotic that moves with the fuel pipe and detects gasoline leakages instantly at a low budget. This kit is a demo undertaking that how is leakage is been detecting. We also can use this in industrial packages for detecting pipeline leakages with massive length package. The IoT performs a chief position on this due to the fact we're going see the area in cloud garage through the net. And also the values of temperature of the surroundings present inside the pipeline. This proposed paper is aimed toward developing that continuously video display units that gas leak with the help of the electronic sensors. This facts is made available real-time thru actual-time feeds over the net. This records facilitates in easily locating the foundation motive of the emergency situation. This paper proposes an implementation of RFID and sensors within the clever security robot navigation system.

References

  1. A.Sahai andB. Waters,“Fuzzyidentity-based encryption,''inProc.Euro Crypt,2005, pp.457_473.
  2. J.Bethencourt,A.Sahai,andB.Waters,“Ciphertext-policyattribute-basedencryption,''inProc.IEEESymp.Secur.Privacy,May2007, pp. 321_334.
  3. N.AttrapadungandH.Imai,“Conjunctivebroadcastandattribute-basedencryption,''inProc.Int.Conf.Pairing-BasedCryptogr.,2009, pp. 248_265.
  4. B.Waters,“Ciphertext-policyattribute-basedencryption:Anexpressive,efficient,andprovablysecurerealization,''inProc.PublicKeyCryptogr., 2011, pp. 53_70.
  5. M.Green,S.Hohenberger,andB.Waters,“OutsourcingthedecryptionofABEciphertexts,''inProc.USENIXSecur.Symp.,2011, p. 34.
  6. J.Lai,R.H.Deng,C.Guan,andJ.Weng,“Attribute-basedencryptionwithveriableoutsourceddecryption,''IEEETrans.Inf.ForensicsSecurity, vol. 8, no. 8, pp. 1343_1354, Aug. 2013.
  7. S.Lin,R.Zhang,H.Ma,andM.Wang,“Revisitingattribute-basedencryptionwithveriableoutsourceddecryption,''IEEETrans.Inf.ForensicsSecurity, vol. 10, no. 10, pp. 2119_2130, Oct. 2015.
  8. M.ChaseandS.S.M.Chow,“Improvingprivacyandsecurityinmulti-authorityattribute-basedencryption,''inProc.ACMCCS, 2009, pp. 121_130.
  9. G.Zhang,L.Liu,andY.Liu,“Anattribute-basedencryptionschemesecureagainstmaliciousKGC,''inProc.TRUSTCOM,Jun. 2012, pp. 1376_1380.
  10. J. Hur, “Improving security and efficiency in attribute-based data sharing,''IEEE Trans. Knowl. Data Eng., vol. 25, no. 10, pp.2271_2282,Oct. 2013.
  11. P.P.Chandar,D.Mutkuraman,andM.Rathinrai,“Hierarchicalattributebasedproxyre-encryptionaccesscontrolincloudcomputing,''inProc.ICCPCT, Mar. 2014, pp. 1565_1570.
  12. X.A.Wang,J.Ma,andF.Xhafa,“Outsourcingdecryptionofattributebasedencryptionwithenergyefficiency,''inProc.3PGCIC,Nov. 2015, pp.444_448.
  13. L.Cheungand C.Newport, “Provablysecure ciphertext policyABE,''inProc. ACMCCS,2007, pp.456_465.
  14. J.HurandD.K.Noh,“Attribute-basedaccesscontrolwithefficientrevocationindataoutsourcingsystems,''IEEETrans.ParallelDistrib. Syst., vol. 22, no. 7, pp. 1214_1221, Jul. 2011.
  15. M.Pirretti,P.Traynor,P.McDaniel,and B.Waters,“Secureattribute-basedsystems,''in Proc. ACMCCS,2006,pp.99_112.
  16. A.Boldyreva,V.Goyal,andV.Kumar,``Identity-basedencryptionwithefficientrevocation,''inProc.ACMCCS,2008,pp.417_426.
  17. A.-P.Xiong,C.-X.Xu,andQ.-X.Gan,“ACP-ABEschemewithsystemattributesrevocationincloudstorage,''inProc.ICCWAMIP,Dec. 2014,pp. 331_335.
  18. W.Qiuxin,“Agenericconstructionofciphertext-policyattribute-basedencryptionsupportingattributerevocation,''ChinaCommun., vol.11, no. 13, pp. 93_100, 2014.
  19. S.S.M.Chow,“Removingescrowfromidentity-basedencryption,''inProc.Int.Conf.Pract.TheoryPublicKeyCryptogr.,2009, pp. 256_276.
  20. M.S.Ahmad,N.E.Musa,R.Nadarajah,R.Hassan,andN.E.Othman,“ComparisonbetweenAndroidandiOSoperating systeminterms ofsecurity,''inProc. CITA,Jul. 2013,pp.1_4.
  21. V.Goyal,O.Pandey,A.Sahai,andB.Waters,“Attribute-basedencryptionfor fine-grainedaccesscontrolofencrypteddata,''inProc. ACM CCS, 2006, pp. 89_98.
  22. S.RafaeliandD.Hutchison,“Asurveyofkeymanagementforsecuregroupcommunication,''ACMComput.Surv.,vol.35,no. 3,pp. 309_329, Sep. 2003.
  23. S.SubashiniandV.Kavitha,“Asurvey onsecurityissuesinservicedeliverymodelsofcloudcomputing,''J.Netw.Comput.Appl., vol. 34, no. 1, pp. 1_11, 2011.
  24. H.T.Dinh,C.Lee,D.Niyato,andP.Wang,“Asurveyofmobilecloudcomputing:Architecture,applications,andapproaches,''WirelessCommun. MobileComput., vol.13, no.18, pp.1587_1611, Dec.2013.
  25. H. Takabi,J.B.D.Joshi,andG.-J.Ahn,``Securityandprivacychallengesincloudcomputingenvironments,''IEEESecurityPrivacy,vol. 8, no. 6, pp.24_31, Nov./Dec. 2010.
  26. C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,'' IEEETrans.Comput., vol. 62, no. 2, pp. 362_375, Feb.2013.
  27. M.Li,S.Yu,Y.Zheng,K.Ren,andW.Lou,“Scalableandsecuresharingofpersonalhealthrecordsincloudcomputingusingattribute-basedencryption,'' IEEE Trans.ParallelDistrib. Syst., vol. 24,no. 1, pp. 131_143, Jan.2013.
  28. Q.Liu,G.Wang,andJ.Wu,“Time-basedproxyre-encryptionschemeforsecuredatasharinginacloudenvironment,''Inf.Sci.,vol. 258, pp. 355_370, Feb. 2014.
  29. X.Yao,Z.Chen,andY.Tian,“Alightweightattribute-basedencryptionschemefortheInternetofThings,''FutureGenerat.Comput.Syst., vol. 49, pp. 104_112, Aug. 2015.
  30. H.HongandZ.Sun,“Highefficientkey-insulatedattributebasedencryptionschemewithoutbilinearpairingoperations,''SpringerPlus,vol. 5, no. 1, p. 131, Feb. 2016.
  31. M.R.Rahimi,J.Ren,C.H.Liu,A.V.Vasilakos,andN.Venkatasubramanian,“Mobilecloudcomputing:Asurvey,stateofartand futuredirections,''Mobile Netw.Appl., vol. 19,no. 2,pp. 133_143, Apr.2014.
  32. D.Pletea,S.Sedghi,M.Veeningen,andM.Petkovic,“Securedistributedkeygenerationinattributebasedencryptionsystems,''inProc.ICITST, Dec. 2015, pp. 103_107.
  33. X.Xu,J.Zhou, X.Wang,and Y. Zhang,“Multi-authorityproxyreencryption basedonCPABE forcloudstoragesystems,'' J.Syst.Eng.Electron., vol.27, no. 1, pp. 211_223, Feb. 2016.
  34. S.Easwarmoorthy,S.F,andA.Karrothu,“Anefficientkeymanagementinfrastructureforpersonalhealthrecordsincloud,''inProc. WiSPNET, Mar. 2016, pp. 1651_1657.
  35. N.OualhaandK.T.Nguyen,“Lightweightattribute-basedencryptionfortheInternetofThings,''inProc.ICCCN,Aug.2016,pp. 1_6.
  36. GuofengLin,HanshuHongandZhixinSun,“ACollaborativekeymanagementprotocolinCiphertextpolicyattribute-basedencryptionforcloud datasharing”, May2017.

Downloads

Published

2021-06-30

Issue

Section

Research Articles

How to Cite

[1]
Merlin Mary James, Sujitha M, Simy Mary Kurian, Neena Joseph , " Security Model of Sharing Data for Privacy Protection and Performance-Based Outsource Data Sharing On Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 7, pp.515-521, September-October-2018.