A Well-Organized Revocable Data Access Control for Multi-Authority Cloud Storage
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 7
Abstract
Ensuring data security while accessing data in the cloud is a paramount importance. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners more direct control on access policies. However, it is difficult to directly apply existing CP-ABE schemes to data access control for cloud storage systems because of the attribute revocation problem. In this paper, we design an expressive, efficient and revocable data access control scheme for multi-authority cloud storage systems, where there are multiple authorities co-exist and each authority is able to issue attributes independently. Specifically, we propose a revocable multi-authority CP-ABE scheme, and apply it as the underlying techniques to design the data access control scheme. Our attribute revocation method can efficiently achieve both forward security and backward security. The analysis and simulation results show that our proposed data access control scheme is secure in the random oracle model and is more efficient than previous works.
Authors and Affiliations
Harika Mallisetti| M.Tech ,(CSE), NRI Institute of Technology, A.P., India, Jaladi Praveena| Assistant Professor, Dept. of Computer Science & Engineering, NRI Institute of Technology, A.P., India
A proficient document chain of importance characteristic based encryption plot is proposed in distributed computing. The layered access structures are coordinated into a solitary access structure, and after that, the...
Self-assured Collective Data Transferring in Vehicular Ad Hoc Networks
Vehicular adhoc networks (VANETs) is the present innovation utilizing as a part of vehicles like cars and vans. Vehicles are considered as portable hubs in a MANET to make a versatile system likewise the most imperat...
An Efficient Data User Authentication Protocol to Enable Data User Revocation
Cloud computing offer favorable circumstances to individual customers and affiliations which minimizes endeavor and resource use cost. Information owners sending the data to cloud servers without adjacent data organi...
Evaluate the Key Management of Identity-Based Digital Signature To Routing In Cluster-Based Wireless Sensor Networks
Cluster-based information transmission in WSNs has been analyzed by scientists keeping in mind the end goal to accomplish the system scalability and administration, which capitalize on hub life and diminish transfer...
Forecast-Founded Haze Bandwidth and Cost Decrease Scheme
In this paper, we present PACK (Predictive ACKs), a novel end-to-end traffic redundancy elimination (TRE) Scheme, designed for Haze computing customers. Haze-Founded TRE needs to apply a judicious use of Haze resourc...