A Well-Organized Revocable Data Access Control for Multi-Authority Cloud Storage
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 7
Abstract
Ensuring data security while accessing data in the cloud is a paramount importance. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners more direct control on access policies. However, it is difficult to directly apply existing CP-ABE schemes to data access control for cloud storage systems because of the attribute revocation problem. In this paper, we design an expressive, efficient and revocable data access control scheme for multi-authority cloud storage systems, where there are multiple authorities co-exist and each authority is able to issue attributes independently. Specifically, we propose a revocable multi-authority CP-ABE scheme, and apply it as the underlying techniques to design the data access control scheme. Our attribute revocation method can efficiently achieve both forward security and backward security. The analysis and simulation results show that our proposed data access control scheme is secure in the random oracle model and is more efficient than previous works.
Authors and Affiliations
Harika Mallisetti| M.Tech ,(CSE), NRI Institute of Technology, A.P., India, Jaladi Praveena| Assistant Professor, Dept. of Computer Science & Engineering, NRI Institute of Technology, A.P., India
Unique value disintegration for probing results using clustering algorithm
This paper describes gene expression analysis by Unique Value Disintegration(UVD), emphasizing initial characterization of the data. We describe UVD methodsfor visualization of gene expression data, representation of...
Mainstream issue in data mining, which is called "high-utility itemset mining" or all the more for the most part utility mining. High Utility Itemsets which are itemsets having an utility gathering a client determine...
Impact Analysis of A Car Bumper Using Carbon Fiber Reinforced PEI And S2 Glass/Epoxy Materials By Solid Works Software
Bumper is an important part which is used as protection for passengers from front and rear collision. The intend of this study was to investigate the structure and material employed for car bumper in one of the car m...
A Two Layer Secure Data Search with Bilinear Map and AES over Cloud
Multikeyword search over cloud is an interesting research issue in the field of knowledge and data engineering of cloud computing. Various researchers proposed various solutions to upload and process documents over c...
A dynamic power channel actualized with a four-leg voltage-source inverter utilizing a prescient control plot is exhibited. The utilization of a four-leg voltage-source inverter permits the pay of current consonant p...