Revocable Data Access Control for Secure Data Sharing In Cloud

Authors

  • R. Gayathri  Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India
  • M. Ganthimathi  Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India

Keywords:

Cloud Computing, AES, DES, ABE, KDC, KDC, OPE, TRSE, OPE

Abstract

Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain valuable information. Thus, it is necessary to place cryptographically enhanced access control on the shared data. Identity-based encryption is a promising crypto graphical primitive to build a practical data sharing system. However, access control isn’t static. That is, when some user’s authorization is expired, there should be a mechanism that can remove him/her from the system. Consequently, the revoked user cannot access both the previously and subsequently shared data. To this end, propose a notion called revocable-storage identity-based encryption (RS-IBE), which can provide the forward/backward security of cipher text by introducing the functionalities of user revocation and cipher text update simultaneously. Furthermore, present a concrete construction of RS-IBE, and prove its security in the defined security model. Furthermore have introduced AES algorithm because the more popular and widely adopted symmetric encryption algorithm likely to be encountered nowadays is the Advanced Encryption Standard (AES). It is found at least six times faster than triple DES. Some features of AES algorithm is Symmetric key symmetric block cipher, 128-bit data, 128/192/256-bit keys, Stronger and faster than Triple-DES, Provide full specification and design details, Software implementable in C and Java. The performance comparisons indicate that the proposers-IBE scheme has advantages in terms of functionality and efficiency, and thus is feasible for a practical and cost-effective data-sharing system.

References

  1. L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud de?nition,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50–55, 2008.
  2. iCloud. (2014) Apple storage service. Online]. Available:https://www.icloud.com/
  3. Azure. (2014) Azure storage service. Online]. Available: http://www.windowsazure.com/
  4. Amazon. (2014) Amazon simple storage service (amazon s3). Online]. Available: http://aws.amazon.com/s3/
  5. K. Chard, K. Bubendorfer, S. Caton, and O. F. Rana, “Social cloud computing: A vision for socially motivated resource sharing,” Services Computing, IEEE Transactions on, vol. 5, no. 4, pp. 551–563, 2012.
  6. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for secure cloud storage,” Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362–375, 2013.
  7. G. Anthes, “Security in the cloud,” Communications of the ACM, vol. 53, no. 11, pp. 16–18, 2010.
  8. K. Yang and X. Jia, “An ef?cient and secure dynamic auditing protocol for data storage in cloud computing,” Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 9, pp. 1717–1726, 2013.
  9. B. Wang, B. Li, and H. Li, “Public auditing for shared data with ef?cient user revocation in the cloud,” in INFOCOM, 2013 Proceedings IEEE. IEEE, 2013, pp. 2904–2912.
  10. S. Ruj, M. Stojmenovic, and A. Nayak, “Decentralized access control with anonymous authentication of data stored in clouds,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2, pp. 384–394, 2014.
  11. X. Huang, J. Liu, S. Tang, Y. Xiang, K. Liang, L. Xu, and J. Zhou, “Cost-effective authentic and anonymous data sharing with forward security,” Computers, IEEE Transactions on, 2014, doi: 10.1109/TC.2014.2315619.
  12. C.-K. Chu, S. S. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, “Key-aggregate cryptosystem for scalable data sharing in cloud storage,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2, pp. 468–477, 2014.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
R. Gayathri, M. Ganthimathi, " Revocable Data Access Control for Secure Data Sharing In Cloud, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.846-850, March-April-2017.