Multi-way Cloud-Side Access Control for Encrypted Cloud Storage

Patnala Rajesh kumar, D D Srinivas

Abstract


Individuals support the incredible intensity of cloud computing, however can't completely believe the cloud providers to have protection delicate data, because of the nonattendance of client to-cloud controllability. To guarantee confidentiality, data administrators redistribute scrambled data rather than plaintexts. To impart the scrambled files to different clients, ciphertext-strategy attribute-based encryption can be used to direct fine-grained and administrator driven access control. Yet, this doesn't adequately get secure against different assaults. Numerous past schemes didn't concede the cloud supplier the capacity to check whether a downloader can decode. Along these lines, these files ought to be accessible to everybody open to the cloud storage. A noxious aggressor can download a great many files to dispatch monetary refusal of supportability assaults, which will to a great extent expend the cloud asset. The payer of the cloud service bears the cost. These worries ought to be settled in true open cloud storage. In this paper, we propose an answer for secure encoded cloud storages from EDoS assaults and give asset utilization responsibility. We present two conventions for various settings, trailed by execution and security examination. Furthermore, attribute-based control in the framework additionally empowers the cloud server to confine the entrance to those clients with a similar arrangement of attributes while protecting client security, i.e., the cloud server just realizes that the client satisfies the necessary predicate, however has no clue on the specific identity of the client.


References


References

C. Chu, W. T. Zhu, J. Han, J. K. Liu, J. Xu, and J. Zhou, “Securityconcerns in popular cloud storage services,”vol. 12, no. 4, pp. 50–57, October-December 2013.

T. Jiang, X. Chen, J. Li, D. S. Wong, J. Ma, and J. K. Liu, “TIMER: secureand reliable cloud storage against data re-outsourcing,” vol. 8434, pp. 346–358, May 2014.

K. Liang, J. K. Liu, D. S. Wong, and W. Susilo, “An efficient cloudbasedrevocable identity-based proxy re-encryption scheme for public clouds data sharing,” vol. 8712,September 2014.

T. H. Yuen, Y. Zhang, S. Yiu, and J. K. Liu, “Identity-based encryptionwith post-challenge auxiliary inputs for secure cloud applications andsensor networks,” vol. 8712, pp.130–147, September 2014.

K. Liang, M. H. Au, J. K. Liu, W. Susilo, D. S. Wong, G. Yang, T. V. X.Phuong, and Q. Xie, “A DFA-based functional proxy reencryptionscheme for secure public cloud data sharing,” vol. 9, no. 10, pp. 1667–1680,October 2014

T. H. Yuen, J. K. Liu, M. H. Au, X. Huang, W. Susilo, and J. Zhou, “ktimesattribute-based anonymous access control for cloud computing,” vol. 64, no. 9, pp. 2595–2608,September 2015.

S.Saravanan, Arivarasan.”An efficient ranked keyword search for effective utilization of outsourced cloud data” Journal of Global Research in Computer Science, Vol4(4), pp:8-12

S Saravanan, V Venkatachalam ,“ Improving map reduce task scheduling and micro-partitioning mechanism for mobile cloud multimedia services” International Journal of Advanced Intelligence Paradigms ,Vol 8(2),pp157- 167,2016.

S Saravanan, V Venkatachalam ,“ Advance Map Reduce Task Scheduling algorithm using mobile cloud multimedia services architecture” IEEE Digital Explore,pp21-25,2014.

S.Swathi “Preemptive Virtual Machine Scheduling Using CLOUDSIM Tool”, International Journal of Advances in Engineering, 2015, 1(3), 323 -327 ISSN: 2394-9260, pp:323-327.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.