Total views : 61

Improved Attribute based Encryption Scheme over Integrated Data Access Control Structures in Cloud Computing

Affiliations

  • Department of Computer Science and Engineering, Sri Satya Sai University of Technology and Medical Sciences, Sehore – 466001, Madhya Pradesh, India

Abstract


The advancements made in the Information and Communication Technologies (ICT) has increased the number of social users. A new promising technology, named, cloud computing resolves most of the recent real-time issues. Data sharing is one of the most recent topics explored by the researchers. By sharing the common attributes, the data owners can elegantly solve the data redundancy, cost minimization/ maximization, security etc. This kind of sharing attributes are profound in healthcare and military applications. Prior works have explored the study of data sharing concepts, yet it fails to satisfy the data owner’s requirements. In this paper, we have proposed an enhanced file hierarchy system in specific to attribute-based encryption schemes. Meanwhile, the file hierarchical system is controlled by data access control layer of cloud technologies. By devising the access control layer, we can efficiently arrange encrypted files in hierarchical model with reduced storage and time cost of encryption and decryption. Experimental analysis has shown the efficacy of our proposed scheme in terms of better achieved storage consumption with increased number of files and attributes.

Keywords

Attributes, Cloud Computing, Data Owner, Encryption, File Hierarchy Systems, Storage Consumption

Full Text:

 |  (PDF views: 41)

References


  • Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W. An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security; 2016. Crossref. Crossref.
  • K. Priyadarsini, Selvan KT. A survey on encryption schemes for data sharing in cloud computing. International Journal of Computer Science, Information Technology, and Security. 2012 Oct; 2(5).
  • Antony N, Melvin AAR. A survey on encryption schemes in the clouds for access control. International Journal of Computer Science and Management Research. 2012 Dec; 1(5).
  • Khan AR. Access control in cloud computing environment.ARPN Journal of Engineering and Applied Sciences. 2012 May; 7(5).
  • Zhu Y, Huy H, Ahny G-J, Huangy D, Wang S. Towards temporal access control in cloud computing. INFOCOM; 2012
  • Yu S, Ren CWK, Lou W. Achieving secure, scalable, and fine-grained data access control in cloud computing.INFOCOM10.
  • Wang G, Liu Q, Wub J, Guo M. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. 2011 Jul.
  • Begum R, Kumar RN, Kishore V. Data Confidentiality Scalability and Accountability (DCSA) in cloud computing.2012 Nov; 2(11).
  • Hota C, Sanka S. Capability-based cryptographic data access control in cloud computing. International Journal on Advanced Networking and Applications. 2011; 03(03):1152–61.
  • Suma V, Kuma KV. An efficient scheme for cloud services based on access policies. International Journal of Engineering Research & Technology. 2012 Oct; 1(8).
  • Kandukuri R, Paturi VR, Rakshit A. Cloud security issues.Proceedings of the 2009 IEEE International Conference on Services Computing; 2009 Sep. p. 517–20. Crossref.
  • Sterritt R. Autonomic computing. Innovations in Systems and Software Engineering. 2005; 1(1):79–88.
  • Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems. 2008 Jun; 25(6): 599–616.
  • Vaquero LM, Rodero-Merino L, Caceres J, Lindner M. A break in the clouds: Towards a cloud definition. ACM SIGCOMM Computer Communication Review. 2009 Jan; 39(1):50–5. Crossref.
  • Salesforce.com, Inc. Force.com platform [Internet]. [cited 2009 Dec]. Available from: http://www.salesforce.com/tw/.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.