Efficient and Secure Data Access Control for Multi-Authority Cloud Storage Systems
Keywords:
Attributes -Based Encryption, Access control, data storage, Multi-AuthorityAbstract
Information get to control is an effective method to give the information security in the cloud however because of information outsourcing over untrusted cloud servers, the information get to control turns into a testing issue in cloud storage frameworks. Attribute based Encryption (ABE) procedure is viewed as a most dependable cryptographic leading instrument to ensure information owner's immediate control on their information out in the open cloud storage. The past ABE plans include just a single authority to keep up the entire Attribute set, which can expedite a solitary point block both security and execution. Paper proposed the plan, an expressive, proficient and revocable decentralized way information get to control plot for multi-authority cloud storage frameworks, where there are various experts exist and each authority can issue Attribute s autonomously.
References
- L. Cheung and C. C. Newport, “Provably secure ciphertext policy ABE," Proc. ACM Conf. Computer &Communications Security, pp. 456-465, 2007 S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: cloud access control in clouds," Proc. TrustCom’11, pp. 91-98, IEEE, 2011
- Hague Wan, June Liu, and Deng, R.H., "HASBE: A Hierarchical At- tribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing," IEEE Trans. Information Forensics and Security, vol.7, no.2, pp. 743-754, April 2012
- Junzuo Lai, Deng, R.H., Chaowen Guan, and Jian Weng, "Attribute Based Encryption With Verifiable Outsourced Decryption," IEEE Trans. Information Forensics and Security, vol.8, no.8, pp. 1343-1354, Aug. 2013
- J. Hur and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 7, pp.1214-1221, Jul. 2011
- J. Hur, “Improving security and efficiency in attribute-based data sharing," IEEE Trans. Knowlthreshold and Data Engineering, vol. 25, no. 10, pp. 2271-2282, Oct. 2013
- M. Chase and S. S. M. Chow, “Improving privacy and security in multiauthority attribute-based encryption," Proc. CCS’09, pp.121-130, 2009
- M. Chase, “Multiauthority attribute-based encryption," Proc.TCC’07, pp. 515-534, Springer, 2007
- S. Müller, S. Katzenbeisser, and C. Eckert, “Cloud attribute-based encryption," Proc. 11th Int. Conf. Information Security and Cryptology, pp. 20-36, Springer, 2008
- A. B. Lewko and B. Waters, “Decentralizing Attribute-based Encryp- tion," Proc. EUROCRYPT’11, pp. 568-588, Springer, 2011
- H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multiauthority attribute based encryption without a central authority," Inf. Sci., vol.180, no. 13, pp. 2618-2632, 2010
- Wei Li, Kaiping Xue, Yingjie Xue, and Jianan Hong, “TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage", IEEE Transactions on parallel and cloud systems, VOL.24, NO. 06, October 2015.
- Jianan Hong, Kaiping Xue and Wei Li, “Comments on “DAC-MACS: Effective Data Access Control for Multi-authority Cloud Storage Systems"/Security Analysis of Attribute Revocation in Multi-authority Data Access Control for Cloud Storage Systems", IEEE transactions on information forensics and security, VOL. 10, NO. 06, June 2015.
- Taeho Jung, Xiang-Yang Li, Zhiguo Wan, and Meng Wan, “Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption", IEEE transactions on information forensics and security, VOL. 10, NO. 01, January 2015.
- Kan Yang and Xiaohua Jia, “Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage", IEEE Transactions on parallel and cloud systems, VOL. 25, NO. 07, July 2014.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.