Indian Journal of Science and Technology
DOI: 10.17485/ijst/2018/v11i48/138791
Year: 2018, Volume: 11, Issue: 48, Pages: 1-7
Original Article
D.S.C. Reddy and Papisetty Saranya*
Department of CSE, PBR Visvodaya Institute of Technology and Science, Nellore - 524201, Andhra Pradesh, India; [email protected], [email protected]
*Author for correspondence
Papisetty Saranya,
Department of CSE, PBR Visvodaya Institute of Technology and Science, Nellore - 524201, Andhra Pradesh, India; [email protected]
Objective: To study the access control scheme to protect users’ privacy problem in cloud environment is great significance. To overcome the above problem we build a new access control scheme with privilege separation based on privacy protection. Methods/Statistical Analysis: Data sharing is one of the key features which change the business/individuals life style in store and share data using clouds. But it also poses data privacy issues. To this effect, in this study we develop a scheme named as PS-ACS (Privacy protection based Access control scheme), which uses cloud servers to store and share the owners’ data; for that cloud server divides the users into private and public platforms. And also analyzes the Key Aggregate Encryption (KAE) and Improved Attribute-Based Signature (IABS) to manage the read and write access rights of users in private platform. Also re-evaluates the Hierarchical Attribute-based Encryption which is applied to avoid the bottleneck issue in public platform. Findings: Here, we consider the data files of user’s private photos, blog data, log files, and business files which required data owners to grant the access rights to read or modify the private data. To protect the data privacy, we use KAE and IABS to build the PS-ACS while sharing the data to the cloud users. In this study, we also show our scheme is protects the data privacy rather than existing techniques. Applications/Improvements: We have used different encryption schemes in two different platforms which protect the data privacy efficiently and also we extend our scheme to avoid the single point of failure using HABE efficiently.
Keywords: Access Control, Attribute Based Signature Scheme, Data Sharing, Privacy Protection, User Revocation
Subscribe now for latest articles and news.