Efficient and Secure Data Access Control for Multi-Authority Cloud Storage Systems

Authors

  • D. V. L. Saraswathi  PG Scholar, Department of Computer Science and Engineering, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India
  • Dr. K V V S Narayana Murthy  Professor, Computer Science and Engineering, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India
  • Dr. D. Mohan Reddy  Professor & Principal, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India

Keywords:

Attributes -Based Encryption, Access control, data storage, Multi-Authority

Abstract

Information get to control is an effective method to give the information security in the cloud however because of information outsourcing over untrusted cloud servers, the information get to control turns into a testing issue in cloud storage frameworks. Attribute based Encryption (ABE) procedure is viewed as a most dependable cryptographic leading instrument to ensure information owner's immediate control on their information out in the open cloud storage. The past ABE plans include just a single authority to keep up the entire Attribute set, which can expedite a solitary point block both security and execution. Paper proposed the plan, an expressive, proficient and revocable decentralized way information get to control plot for multi-authority cloud storage frameworks, where there are various experts exist and each authority can issue Attribute s autonomously.

References

  1. L. Cheung and C. C. Newport, “Provably secure ciphertext policy ABE," Proc. ACM Conf. Computer &Communications Security, pp. 456-465, 2007 S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: cloud access control in clouds," Proc. TrustCom’11, pp. 91-98, IEEE, 2011
  2. Hague Wan, June Liu, and Deng, R.H., "HASBE: A Hierarchical At- tribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing," IEEE Trans. Information Forensics and Security, vol.7, no.2, pp. 743-754, April 2012
  3. Junzuo Lai, Deng, R.H., Chaowen Guan, and Jian Weng, "Attribute Based Encryption With Verifiable Outsourced Decryption," IEEE Trans. Information Forensics and Security, vol.8, no.8, pp. 1343-1354, Aug. 2013
  4. J. Hur and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 7, pp.1214-1221, Jul. 2011
  5. J. Hur, “Improving security and efficiency in attribute-based data sharing," IEEE Trans. Knowlthreshold and Data Engineering, vol. 25, no. 10, pp. 2271-2282, Oct. 2013
  6. M. Chase and S. S. M. Chow, “Improving privacy and security in multiauthority attribute-based encryption," Proc. CCS’09, pp.121-130, 2009
  7. M. Chase, “Multiauthority attribute-based encryption," Proc.TCC’07, pp. 515-534, Springer, 2007
  8. S. Müller, S. Katzenbeisser, and C. Eckert, “Cloud attribute-based encryption," Proc. 11th Int. Conf. Information Security and Cryptology, pp. 20-36, Springer, 2008
  9. A. B. Lewko and B. Waters, “Decentralizing Attribute-based Encryp- tion," Proc. EUROCRYPT’11, pp. 568-588, Springer, 2011
  10. H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multiauthority attribute based encryption without a central authority," Inf. Sci., vol.180, no. 13, pp. 2618-2632, 2010
  11. Wei Li, Kaiping Xue, Yingjie Xue, and Jianan Hong, “TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage", IEEE Transactions on parallel and cloud systems, VOL.24, NO. 06, October 2015.
  12. Jianan Hong, Kaiping Xue and Wei Li, “Comments on “DAC-MACS: Effective Data Access Control for Multi-authority Cloud Storage Systems"/Security Analysis of Attribute Revocation in Multi-authority Data Access Control for Cloud Storage Systems", IEEE transactions on information forensics and security, VOL. 10, NO. 06, June 2015.
  13. Taeho Jung, Xiang-Yang Li, Zhiguo Wan, and Meng Wan, “Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption", IEEE transactions on information forensics and security, VOL. 10, NO. 01, January 2015.
  14. Kan Yang and Xiaohua Jia, “Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage", IEEE Transactions on parallel and cloud systems, VOL. 25, NO. 07, July 2014.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
D. V. L. Saraswathi, Dr. K V V S Narayana Murthy, Dr. D. Mohan Reddy, " Efficient and Secure Data Access Control for Multi-Authority Cloud Storage Systems, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 2, pp.389-396, January-February-2018.