A Secured framework for SACM in Cloud Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 10
Abstract
The paradigm that offers Cloud computing is advantages in economic aspects, by reducing flexible computing, capabilities limitless computing power and time to market. To use the full potential of cloud computing like transferring, processing and storing time of data by external cloud providers. To keep user data confidential from untrusted cloud servers, existing solutions use cryptographic methods and only disclose decryption keys to the authentic users. Unfortunately, these models are not applicable to cloud as the data owners and service providers are not in the same trusted domain. Therefore, Our proposed scheme enables the data owner to delegate tasks of data file creation ,encryption ,decryption ,re-encryption and user secret key update to cloud servers without disclosing data contents or user unique access structure information. Main issues such as privacy, scalability for key management, flexibility in access and user revocation which are the most important considerations for gaining scalability and flexibility. We achieve our design goals by a novel structuring , Advanced attribute based encryption in which a unique access structure is assign for each attributes In existing scheme revocation user details such as private key are updated manually after each user revocation. In our architecture at server side a ttp value (threshold value) is set, when it reaches the threshold value revoked users are updated and updating is performedby using atomic proxy cryptography technique of re-encryption for revocation of user to update the attributes of all the live users. This construction allows each data owner to access his data files with minimum online time and minimum overhead which the aim of our work.We formally prove the security of AABE based on security of the cipher text-policy attribute-based encryption (CP-ABE) scheme by Bethencourt et al. and analyze its performance and computational complexity.
Authors and Affiliations
Vaibhav Gandhi, Prof. Prashant Lakkadwala
Insurance Fraud Detection Using Big Data Analytics
The volume of data available to businesses from both internal systems and external channels has led to a new category of application known as “Big Data”. For insurers, the benefits of using analytical applications that...
Computer networks Considerations When Choosing a Topology
Instantly sending messages across the world has represented something new and extraordinary in the world of computer networks. Instant messaging saw the increase in usage of 'text language' and emoticons which served as...
Introduction To Artificial intelligence
Artificial intelligence (AI), the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. The term is frequently applied to the project of developing syst...
An Empirical Analysis and Designing of Data Mining Clustering Algorithm
Data mining is the technique of running the data through the algorithms for discovering the meaningful correlations and patterns among the data that would remain hidden otherwise. The overall goal of the data mining pro...
The Status of Technology in Interior Design and Decoration
Construction industry, including the most desirable and most economical manufacturing industries is a significant contribution to employment and gross domestic product. Unfortunately, in our country because of the use o...