Privacy and Security in Data Storage Using Two Layer Encryption and MAC Verification

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: For the privacy and security of data stored in data storage a new Two Layer Encryption (TLE) approach is developed. This technique performs an encryption at two layers based on some ACP(Access Control Policies)on the data owner as well as on the datastorage.The data owner and the data storage utilizes a key management scheme with the help of a key generating algorithmABGKM (Attribute Based Group Key Management)whereby the actual keys do not need to be distributed by the users. The single layer encryption approach using keyword search has some drawbacks such as the privacy of the identity attributes of the users is not taken into account so that the data storage can learn some information about the users and the organization. The random keyword search request also cause loss of information and degrade the privacy of encrypted data. This thesis of two layer encryption allows more secure and private way to handle data updates, user dynamics and policy changes. If there is a change in user dynamics or policy the outer layer of encryption needs to be updated. Since the outer layer encryption is done at the data storage, no transmission of data required between the data owner and data storage. The user who satisfies the access control policies should be able to decrypt the keys twice in order to access the data makes the system more secure and private. Hence my propped thesis has a newly added advantage of two layer encryption using Attribute Based Group Key management (ABGKM) provides a strong secure layer for data storage in servers.

Authors and Affiliations

Ashly. k. Achenkunju.

Keywords

Related Articles

 Design and Implementation of Automatic Irrigation ControlSystem

Abstract: The objective of irrigation is to keep measure on food security and the aim of automatic irrigationcontrol system is to minimize the intervention of the human operator (gardener) in irrigation activities. Theau...

 Image Steganography and Global Terrorism

 This paper informs the reader how an innocent looking digital image hides a deadly terrorist plan. It analyses the strengths of image steganography and the reasons why terrorists are relying on it. It also aims t...

Iris recognition by using blood vessel segmentation

Abstract: Among the various biometrics technologies, iris recognition is the most reliable and accurate biometric identification system available. In this paper a novel framework for recognizing and identifying iris is b...

Simulation of Parallel and Distributed Computing: A Review

Abstract : Parallel and Distributed Computing has made it possible to simulate large infrastructures like Telecom networks, air traffic etc. in an easy and effective way. It not only makes the processes faster and reliab...

 A New Approach to Compressed Image Steganography Using Wavelet Transform

Abstract : This paper proposes a novel steganographic technique that embeds compressed payload image within cover image. The pixel adjustment of the cover image is done optimally using Fourier Transform, so that visual c...

Download PDF file
  • EP ID EP163099
  • DOI -
  • Views 111
  • Downloads 0

How To Cite

Ashly. k. Achenkunju. (2014).  Privacy and Security in Data Storage Using Two Layer Encryption and MAC Verification. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 17-23. https://europub.co.uk/articles/-A-163099