AN EFFICIENT AND SECURE POLICY UPDATE OUTSOURCING SCHEME FOR BIG DATA STORAGE IN CLOUD
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 3, Issue 5
Abstract
Store the big data in cloud is a best and an effective option due to its high volume and velocity. Generally, the cloud has the capability to store the big data and to process the high volume of user access requests. In cloud environment, the Attribute Based Encryption (ABE) technique ensures the end-to-end security of big data. But, the policy updating is a challenging issue, when the ABE is used to construct an access control schemes. With the help of trivial implementation, a data owners retrieve the data and reencrypt it under new access policy, then send it back to the cloud. However, this approach sustains high communication overhead and heavy computational burden. Thus, this paper proposes a novel scheme to enable an efficient access control with dynamic policy updating for storing the big data in cloud. In this paper, an outsourced policy updating method is developed for designing the ABE systems that avoids the transmission of encrypted data and reduces the computation work of data owners. To check whether the cloud server has updated the cipher-texts correctly, an efficient and secure method was also proposed in this work. Finally, the experimental analysis demonstrates that the proposed system is correct, secure, efficient and complete.
Authors and Affiliations
AshaVani MBC, Vithya TR
IMPROVING SECURITY AND DEDUPLICATION FOR OUTSOURCED DATABASE IN CLOUD COMPUTING
To improve the security of data by using Elliptic Curve Cryptography (ECC) Algorithm. The duplicated data will be detected and avoid with a Secure Hash Algorithm (SHA). In many case when the dishonest Cloud Service Provi...
ENCRYPTION BASED INTRUSION DETECTION IN MANET USING AODV ROUTING PROTOCOL
Nowadays, Network is more vulnerable to the security attacks. Especially The effective operation of Mobile Ad-hoc networks (MANETs) compromised by a variety of security attacks depends upon the v...
ROLE OF HUMAN RESOURCES DEPARTMENT IN CORPORATE GOVERNANCE/ CORPORATE SOCIAL RESPONSIBILITY
The terms “Corporate governance” is a new buzzword of the 21P st P century. In fact the word “governance” is used for addressing all the issues. Generally the word “governance” is used for governing the country or a stat...
SENSOR-FAULT TOLERANT BASED GAIN SCHEDULING CONTROLLER FOR NETWORKED DC MOTOR SYSTEM
This work is concerned with the controller design of NDCMS. A fuzzy gain scheduling controller has been designed to overcome the sensor faults and also to manage the network delay and packet dropouts. Fu...
EMPLOYMENT CHANCE PREDICTION BASED ON DECISION TREES AND NAIVE BAYES CLASSIFIER USING DATA MINING TECHNIQUES
Data Mining is the non-trivial extract information from a data set and transforms it into an understandable structure for further use. Data mining is the search for the relationship and global pattern that exi...