DOI QR코드

DOI QR Code

Robust and Auditable Secure Data Access Control in Clouds

  • KARPAGADEEPA.S (Department of Computer Science, Sri Jayendra Saraswathy Maha Vidyalaya College of Arts and Science) ;
  • VIJAYAKUMAR.P (Department of Computer Applications, Sri Jayendra Saraswathy Maha Vidyalaya College of Arts and Science)
  • Received : 2024.05.05
  • Published : 2024.05.30

Abstract

In distributed computing, accessible encryption strategy over Auditable data is a hot research field. Be that as it may, most existing system on encoded look and auditable over outsourced cloud information and disregard customized seek goal. Distributed storage space get to manage is imperative for the security of given information, where information security is executed just for the encoded content. It is a smaller amount secure in light of the fact that the Intruder has been endeavored to separate the scrambled records or Information. To determine this issue we have actualize (CBC) figure piece fastening. It is tied in with adding XOR each plaintext piece to the figure content square that was already delivered. We propose a novel heterogeneous structure to evaluate the issue of single-point execution bottleneck and give a more proficient access control plot with a reviewing component. In the interim, in our plan, a CA (Central Authority) is acquainted with create mystery keys for authenticity confirmed clients. Not at all like other multi specialist get to control plots, each of the experts in our plan deals with the entire trait set independently. Keywords: Cloud storage, Access control, Auditing, CBC.

Keywords

References

  1. P. Mell and T. Grance, "The NIST definition of cloud computing," National Institute of Standards and Technology Gaithersburg, 2011. 
  2. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement," IEEE Transactions on Parallel & Distributed Systems, vol. 27, no. 9, pp. 2546-2559, 2016.  https://doi.org/10.1109/TPDS.2015.2506573
  3. Z. Fu, X. Sun, S. Ji, and G. Xie, "Towards efficient content-aware search over encrypted outsourced data in cloud," in in Proceedings of 2016 IEEE Conference on Computer Communications (INFOCOM 2016). IEEE, 2016, pp. 1-9. 
  4. K. Xue and P. Hong, "A dynamic secure group sharing framework in public cloud computing," IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 459-470, 2014.  https://doi.org/10.1109/TCC.2014.2366152
  5. Y. Wu, Z. Wei, and H. Deng, "Attribute-based access to scalable media in cloud-assisted content sharing," IEEE Transactions on Multimedia, vol. 15, no. 4, pp. 778-788, 2013.  https://doi.org/10.1109/TMM.2013.2238910
  6. J. Hur, "Improving security and efficiency in attribute based data sharing," IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 10, pp. 2271-2282, 2013.  https://doi.org/10.1109/TKDE.2011.78
  7. J. Hur and D. K. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214-1221, 2011.  https://doi.org/10.1109/TPDS.2010.203
  8. J. Chen and H. Ma, "Efficient decentralized attribute based access control for cloud storage with user revocation," in Proceedings of 2014 IEEE International Conference on Communications (ICC 2014). IEEE, 2014, pp. 3782-3787. 
  9. M. Chase and S. S. Chow, "Improving privacy and security in multi-authority attribute-based encryption," in Proceedings of the 16th ACM conference on Computer and Communications Security (CCS 2009). ACM, 2009, pp. 121-130. 
  10. W. Li, K. Xue, Y. Xue, and J. Hong, "TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage," IEEE Transactions on Parallel & Distributed Systems, vol. 27, no. 5, pp. 1484-1496, 2016.  https://doi.org/10.1109/TPDS.2015.2448095
  11. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute based encryption for fine-grained access control of encrypted data," in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006). ACM, 2006, pp. 89-98. 
  12. J. Bethencourt, A. Sahai, and B. Waters, "Ciphertextpolicy attribute-based encryption," in Proceedings of IEEE Symposium on Security and Privacy (S&P 2007). IEEE, 2007, pp. 321-334. 
  13. J. Shao, R. Lu, and X. Lin, "Fine-grained data sharing in cloud computing for mobile devices," in Proceedings of 2015 IEEE Conference on Computer Communications (INFOCOM 2015). IEEE, 2015, pp. 2677-2685. 
  14. J. Li, X. Huang, J. Li, X. Chen, and Y. Xiang, "Securely outsourcing attribute-based encryption with checkability," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2201-2210, 2014.  https://doi.org/10.1109/TPDS.2013.271
  15. S. Ruj, A. Nayak, and I. Stojmenovic, "DACC: Distributed access control in clouds," in Proceedings of the 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). IEEE, 2011, pp. 91-98. 
  16. K. Yang and X. Jia, "Expressive, efficient and revocable data access control for multi-authority cloud storage," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 7, 2013. 
  17. J. Han, W. Susilo, Y. Mu, J. Zhou, and M. H. A. Au, "Improving privacy and security in decentralized cipher text policy attribute-based encryption," IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 665-678, 2015.  https://doi.org/10.1109/TIFS.2014.2382297
  18. T. Jung, X.-Y. Li, Z. Wan, and M. Wan, "Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption," IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 190-199, 2015.  https://doi.org/10.1109/TIFS.2014.2368352
  19. K. Yang, X. Jia, and K. Ren, "Secure and verifiable policy update outsourcing for big data access control in the cloud," IEEE Transactions on Parallel & Distributed Systems, vol. 26, no. 12, pp. 3461-3470, 2015. https://doi.org/10.1109/TPDS.2014.2380373