The Secured Data Sharing For Multiauthority Access in Cloud Storage

R.N.D.S.S. Lakshmi, B.V. Ram Kumar

Abstract


Cloud record sharing indicates to a scope of cloud services that enables individuals to store and synchronize archives, photographs, recordings and different files in the cloud—and offer them with other individuals. These services additionally enable clients to share and synchronize data among different gadgets for a solitary proprietor. These services are open through work areas, scratch pad, advanced mobile phones and media tablets, and give a basic system to synchronizing data over numerous gadgets. In cloud computing, to shield data from spilling, clients need to scramble their data before being shared. In this paper we propose a proficient encryption plan based on layered model of the entrance structure is proposed in cloud computing, which is named document progression CP-ABE plan. FH-CP-ABE broadens normal CP-ABE with a various leveled structure of access approach, in order to accomplish basic, adaptable and fine-grained access control.


References


Chase and S.S.M. Chow, ‘‘Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,’’ in Proc. 16th ACM Conf. Computer and Comm. Security (CCS’09), 2009, pp. 121-130.

A.B. Lewko and B. Waters, ‘‘Decentralizing Attribute-Based Encryption,’’ in Proc. Advances in Cryptology-EUROCRYPT’11, 2011, pp. 568-588.

S. Yu, C. Wang, K. Ren, and W. Lou, ‘‘Attribute Based Data Sharing with Attribute Revocation,’’ in Proc. 5th ACM Symp. Information, Computer and Comm. Security (ASIACCS’10), 2010, pp. 261- 270.

M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, ‘‘Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,’’ IEEE Trans. Parallel Distributed Systems, vol. 24, no. 1, pp. 131-143, Jan. 2013.

J. Hur and D.K. Noh, ‘‘Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,’’ IEEE Trans. Parallel Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011.

S. Jahid, P. Mittal, and N. Borisov, ‘‘Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation,’’ in Proc. 6th ACM Symp. Information, Computer and Comm. Security (ASIACCS’11), 2011, pp. 411- 415.

S. Ruj, A. Nayak, and I. Stojmenovic, ‘‘DACC: Distributed Access Control in Clouds,’’ in Proc. 10th IEEE Int’l Conf. TrustCom, 2011, pp. 91-98.

K. Yang and X. Jia, ‘‘Attribute-Based Access Control for Multi-Authority Systems in Cloud Storage,’’ in Proc. 32th IEEE Int’l Conf. Distributed Computing Systems (ICDCS’12), 2012, pp. 1-10.

Boneh and M.K. Franklin, ‘‘Identity Based Encryption from the Weil Pairing,’’ in Proc. 21st Ann. Int’l Cryptology Conf.: Advances in Cryptology - CRYPTO’01, 2001, pp. 213-229.

B. Dilip Kumar Reddy, K. SaiMouni Sri, ”A Survey on Multi Authority Access Control System in Cloud Storage”, in proc. International Journal of Scientific Engineering and Technology Research, April-2017, Pages: 2635-2637

Dilip Reddy. B, DrN.Kasiviswanath, DrS.ZahoorUlqHuq, “Peer to Peer Distributed Data Storage with Security in Cloud Computing”, in proc. to IJESRT International Journal of Engineering Sciences & Research Technology, vol.6 June. 2014,pp. 402-406


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.