Cloud-Based Data Storage and Sharing with Dual Access Control

Authors

  • N. Sai Varsha  MCA, Associate Professor DVR and Dr HS Mic College of Technology, Andhra Pradesh, India
  • B. Triveni  MCA, Associate Professor DVR and Dr HS Mic College of Technology, Andhra Pradesh, India

Keywords:

Access Control, Cloud Storage Service, Cloud-Based Data Storage, Intel SGX, and Attribute-Based Encryption.

Abstract

In recent years, the cost-effective management of cloud-based data storage has piqued the interest of both businesses and educational institutions alike. Service providers must implement secure data storage and sharing mechanisms to protect data confidentiality and service user privacy because they provide their services over an open network. Encryption is the most well-known strategy for shielding delicate information against splitting the difference. The down-to-earth need for information the executives can't, notwithstanding, be completely met simply by scrambling information. To stop A robust access control system for download requests and economic denial of sustainability attacks that would prevent users from using the service should also be taken into consideration. In this arrangement, we consider cloud-based capacity double access control as in we make a control component for both download solicitations and information access without forfeiting security or viability. Every one of the two double access control frameworks proposed in this study is custom fitted to a particular arranged climate.

References

  1. Matthew W Pagano, Michael Rushanan, Aviel D Rubin, Christina Garman, Ian Miers, Joseph A Akinyele, and Matthew Green Charm: a method for quickly creating prototypes of cryptosystems, Diary of Cryptographic Designing, 3(2), pp. 111-118, 2013.
  2. A cutting-edge method of CPU-based attestation and sealing is presented by Shay Gueron, Simon Johnson, Vincent Scarlata, and Ittai Anati in Volume 13, page 7 of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP) 2013: New York, NY, USA: ACM
  3. The current family of Antonis Michalas and Alexandros Bakas: A quality-based, symmetric accessible, and SGX-based crossover encryption strategy that can be changed. In the 2019 edition of Secure COMM, pages 472-486.
  4. Srinivas Devadas and Victor Costain Intel sgx got a handle on it. IACR Cryptology ePrint Archive, 2016(086):1–118
  5. Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, and Sergey Gorbunov IRON: SGX-based encryption that works with Intel. CCS 2017, pages 765-782, in Procedures of the 2017 ACM SIGSAC Gathering on PC and Correspondences Security.
  6. Tatsuaki Okamoto and Eiichiro Fujisaki Secure blend of hilter kilter and symmetric encryption plans. Advances in Cryptology-CRYPTO 1999, pages 537–554. 1999, Springer.
  7. Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. attribute-based encryption for fine-grained control over data access. ACM, 2006, pages 89-98 of ACM CCS 2006.
  8. Enhancing the privacy and security of decentralized ciphertext-policy attribute-based encryption with Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Allen Au, and Jinguang Han. Pages 665–678 of Volume 10, Issue 3 of IEEE Transactions on Information Forensics and Security, 2015.
  9. Imprint Tannian, Joseph Idziorek, and Doug Jacobson's fraudulent attribution of cloud resource consumption. IEEE, 2012, pages 99-106 of IEEE CLOUD 2012.
  10. Jiguo Li, Xiaonan Lin, Yichen Zhang, and Jinguang Han. Ksfoabe: for cloud storage, outsourced attribute-based encryption with a keyword search function. 10(5):715–725, IEEE Transactions on Services Computing, 2017.

Downloads

Published

2023-06-30

Issue

Section

Research Articles

How to Cite

[1]
N. Sai Varsha, B. Triveni "Cloud-Based Data Storage and Sharing with Dual Access Control" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 10, Issue 3, pp.1126-1134, May-June-2023.