A Novel Approach for Providing Security to Data Using Dual Access Technique

Authors

  • N. Shanmuka Srinivas  PG Scholar, Department of Computer Application, Madanapalle Institute of Technology and Science, India
  • V K Venugopal  PG Scholar, Department of Computer Application, Madanapalle Institute of Technology and Science, India

Keywords:

Cloud, Searchable Encryption, Multi-Keyword Search, Multi-User Access, Search Pattern, Access Pattern.

Abstract

Cloud-based data storage service has drawn increasing interests from both academic and industry in the recent years due to its ef?cient and low-cost management. Since it provides services in an open network, it is urgent for service providers to make use of secure data storage and sharing mechanism to ensure data con?dentiality and service user privacy. To protect sensitive data from being compromised, the most widely used method is encryption. merely encrypting data (e.g., via AES) cannot entirely satisfy the actual necessity of data management. Moreover. On the off chance that download demand can be effectively controlled, EDoS attacks can't be launched to prevent customers from receiving a charge out of administration. In this paper, we consider the double access control, with regards to AWS cloud-based capacity, as in we plan a control system over the two information get to and download demand without loss of safety and ef?ciency. Two dual access control systems are designed in this paper, where each of them is for a distinct designed setting. The security and experimental analysis for the systems are also presented

References

  1. Joseph A Akinyele, Christina Garman, Ian Miers, Matthew W Pagano, Michael Rushanan, Matthew Green, and Aviel D Rubin. Charm: a framework for rapidly prototyping cryptosystems. Journal of Cryptographic Engineering, 3(2):111–128, 2013.
  2. Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. Innovative technology for cpu based attestation and sealing. In Workshop on hardware and architectural support for security and privacy (HASP), volume 13, page 7. ACM New York, NY, USA, 2013.
  3. Alexandros Bakas and Antonis Michalas. Modern family: A revocable hybrid encryption scheme based on attribute-based encryption, symmetric searchable encryption and SGX. In SecureComm 2019, pages 472–486, 2019.
  4. Victor Costan and Srinivas Devadas. Intel sgx explained. IACR Cryptology ePrint Archive, 2016(086):1–118, 2016.
  5. Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, and Sergey Gorbunov. IRON: functional encryption using intel SGX. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pages 765–782, 2017.
  6. Eiichiro Fujisaki and Tatsuaki Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Advances in Cryptology-CRYPTO 1999, pages 537–554. Springer, 1999.
  7. Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based encryption for fine-grained access control of encrypted data. In ACM CCS 2006, pages 89–98. ACM, 2006.
  8. Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, and Man Ho Allen Au. Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE transactions on information forensics and security, 10(3):665–678, 2015.
  9. Joseph Idziorek, Mark Tannian, and Doug Jacobson. Attribution of fraudulent resource consumption in the cloud. In IEEE CLOUD 2012, pages 99–106. IEEE, 2012.
  10. Jiguo Li, Xiaonan Lin, Yichen Zhang, and Jinguang Han. Ksfoabe: outsourced attribute-based encryption with keyword search functionforcloudstorage. IEEETransactionsonServicesComputing, 10(5):715–725, 2017.

Downloads

Published

2022-08-30

Issue

Section

Research Articles

How to Cite

[1]
N. Shanmuka Srinivas, V K Venugopal, " A Novel Approach for Providing Security to Data Using Dual Access Technique, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 4, pp.308-315, July-August-2022.