A Hierarchical Multi User Data Share Environment To Protect Data Privacy And Defend Unauthorized Access

Chekuri Avinash, V Swamy Naidu, M. Veerabhadra Rao

Abstract


A hierarchical access control technique M-HABE and an altered three-layer structure is proposed. Contrasting from the current standards, for example, the HABE algorithm and the first three-layer structure, the novel plan for the most part concentrates on the information handling, storing and accessing, which is intended to guarantee the application clients with lawful access experts to get relating detecting information and to limit illegal clients and unapproved legitimate clients access the information, the proposed promising worldview makes it to a great degree appropriate for the versatile distributed computing based worldview. What ought to be underlined is that the most critical feature of all in thin work can be depicted as that the adjusted three-layer structure is intended for settling the security issues.


References


N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: A survey,” Future Generation Computer Systems, vol. 29, no. 1, pp. 84–106, 2013.

S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and R. Buyya, “Cloud based augmentation for mobile devices: motivation, taxonomies, and open challenges,” Communications Surveys & Tutorials, IEEE, vol. 16, no. 1, pp. 337–368, 2014.

R. Kumar and S. Rajalakshmi, “Mobile cloud computing: Standard approach to protecting and securing of mobile cloud ecosystems,” in Computer Sciences and Applications (CSA), 2013 International Conference on. IEEE, 2013, pp. 663–669.

J. Carolan, S. Gaede, J. Baty, G. Brunette, A. Licht, J. Remmell, L. Tucker, and J. Weise, “Introduction to cloud computing architecture,” White Paper, 1st edn. Sun Micro Systems Inc, 2009.

E. E. Marinelli, “Hyrax: cloud computing on mobile devices using mapreduce,” DTIC Document, Tech. Rep., 2009.

Q. Han, S. Liang, and H. Zhang, “Mobile cloud sensing, big data, and 5g networks make an intelligent and smart world,” Network, IEEE, vol. 29, no. 2, pp. 40–45, 2015.

I. Stojmenovic, “Access control in distributed systems: Merging theory with practice,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, 2011, pp. 1–2.

G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,” in Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010, pp. 735–737.

C. Gentry and A. Silverberg, “Hierarchical id-based cryptography,” in Advances in cryptologyASIACRYPT 2002. Springer, 2002, pp. 548–566.

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption,” in Security and Privacy, 2007. SP’07. IEEE Symposium on. IEEE, 2007, pp. 321–334.

A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in cryptology. Springer, 1985, pp. 47–53.

M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, “Security and privacy in cloud computing: A survey,” in Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on. IEEE, 2010, pp. 105–112.

B. Grobauer, T. Walloschek, and E. St¨ocker, “Understanding cloud computing vulnerabilities,” Security & privacy, IEEE, vol. 9, no. 2, pp. 50–57, 2011.

S. Ghemawat, H. Gobioff, and S.-T. Leung, “The google file system,” in ACM SIGOPS operating systems review, vol. 37, no. 5. ACM, 2003, pp. 29–43.

M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, “Security and privacy in cloud computing: A survey,” in Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on. IEEE, 2010, pp. 105–112


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.