Distributed Manipulation Through Unidentified Data Accumulated In Cloud

G. Ramyadeepika, Sheik Ahmad Shah

Abstract


Cloud computing is a rising registering standard in which resources of the processing structure are given as an administration over the Internet. As ensuring as it might be, this standard also conveys quite a few people new difficulties for information security and access control when customers outsource delicate information for offering on cloud servers, which are not inside the same trusted domain as information holders. Regardless, in finishing in this manner, these outcomes unavoidably introduce a significant handling overhead on the information holder for key circulation and information organization when fine grained information access control is sought after, and accordingly don't scale well. The issue of in the meantime achieving fine-grainedness, adaptability, and information classification of access control truly still stays dubious. This paper addresses this open issue by, on one hand, portraying and executing access approaches in light of information qualities, and, on the other hand, allowing the information proprietor to delegate most of the computation endeavors incorporated into fine-grained information access control to un-trusted cloud servers without divulging the basic information substance. We finish this objective by misusing and joining procedures of decentralized key arrangement Attribute Based Encryption (KP-ABE). Broad examination demonstrates that the proposed methodology is exceedingly proficient and secure. We propose another decentralized access control plan for secure information stockpiling in mists that backings unknown validation. In the proposed plan, the cloud checks the arrangement's genuineness without knowing the client's character before putting away information. Our plan likewise has the included component of access control in which just substantial clients have the capacity to decode the put away data. The plan anticipates replay assaults and backings creation, change, and perusing information put away in the cloud. We additionally address client repudiation. Additionally, our confirmation and Access control plan is decentralized and strong, not at all like different access control plans intended for mists which are brought together.The correspondence, calculation, and capacity overheads are practically identical to unified methodologies.


References


SushmitaRuj, Milos Stojmenovic and Amiya Nayak, “Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”, IEEE, 2014.

C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE Trans. Services Computing, Apr.- June 2012.

H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-Based Authentication for Cloud Computing,” Proc. First Int’l Conf. Cloud Computing, 2009.

C. Gentry, “A Fully Homomorphic Encryption Scheme,” PhD dissertation, Stanford Univ., 2009.

A.-R. Sadeghi, T. Schneider, and M. Winandy, “Token-Based Cloud Computing,” Proc. Third Int’l Conf. Trust and Trustworthy Computing (TRUST), 2010.

M. Li, S. Yu, K. Ren, and W. Lou, “Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings,” Proc. Sixth Int’l ICST Conf. Security and Privacy in Comm. Networks (SecureComm), 2010.

S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based Data Sharing with Attribute Revocation,” Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), 2010.

G. Wang, Q. Liu, and J. Wu, “Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services,” Proc. 17th ACM Conf. Computer and Comm. Security (CCS), 2010.

F. Zhao, T. Nishide, and K. Sakurai, “Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems,” Proc. Seventh Int’l Conf. Information Security Practice and Experience (ISPEC), 2011.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.