A Secured framework for SACM in Cloud Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 10
Abstract
The paradigm that offers Cloud computing is advantages in economic aspects, by reducing flexible computing, capabilities limitless computing power and time to market. To use the full potential of cloud computing like transferring, processing and storing time of data by external cloud providers. To keep user data confidential from untrusted cloud servers, existing solutions use cryptographic methods and only disclose decryption keys to the authentic users. Unfortunately, these models are not applicable to cloud as the data owners and service providers are not in the same trusted domain. Therefore, Our proposed scheme enables the data owner to delegate tasks of data file creation ,encryption ,decryption ,re-encryption and user secret key update to cloud servers without disclosing data contents or user unique access structure information. Main issues such as privacy, scalability for key management, flexibility in access and user revocation which are the most important considerations for gaining scalability and flexibility. We achieve our design goals by a novel structuring , Advanced attribute based encryption in which a unique access structure is assign for each attributes In existing scheme revocation user details such as private key are updated manually after each user revocation. In our architecture at server side a ttp value (threshold value) is set, when it reaches the threshold value revoked users are updated and updating is performedby using atomic proxy cryptography technique of re-encryption for revocation of user to update the attributes of all the live users. This construction allows each data owner to access his data files with minimum online time and minimum overhead which the aim of our work.We formally prove the security of AABE based on security of the cipher text-policy attribute-based encryption (CP-ABE) scheme by Bethencourt et al. and analyze its performance and computational complexity.
Authors and Affiliations
Vaibhav Gandhi, Prof. Prashant Lakkadwala
RFID Technology for IOT Based Meal Management System
The current systems of Meal Management in the canteens can be upgraded using Internet of Things (IoT) paradigm involving RFID technology with the purpose to make the existing system faster and efficient. RF identificati...
An Accurate Fault Detection and Classification Algorithm for Double Circuit Transmission Lines Using Artificial Neural Network
This paper presents a new and accurate fault detection and classification strategy for double circuit transmission lines based on artificial neural network. The mutual coupling effect in double circuit transmission line...
slugA Review of Automatic License Plate Detection Using Edge Detection Methods
Vehicle plate recognition is a valuable image processing system employed for detecting and recognizing license plates thereby categorizing and identifying vehicles. Of late several researchers around the globe have ini...
Silver nanoparticles, Antimicrobial action, nanoparticle synthesis
Silver nanoparticles are nanoparticles which are in the range of 1 and 100 nm in size. Silver nanoparticles have unique properties which help in molecular diagnostics in therapies and in devices which are used in severa...
Ensemble based novel class identification for Class Imbalance under sampled Data
The Classification of data is represented as research challenge in handling the class imbalance problem. Classification problems are represented by highly unbalanced data sets, in which, the number of samples from one c...