Privacy and Security in Data Storage Using Two Layer Encryption and MAC Verification

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: For the privacy and security of data stored in data storage a new Two Layer Encryption (TLE) approach is developed. This technique performs an encryption at two layers based on some ACP(Access Control Policies)on the data owner as well as on the datastorage.The data owner and the data storage utilizes a key management scheme with the help of a key generating algorithmABGKM (Attribute Based Group Key Management)whereby the actual keys do not need to be distributed by the users. The single layer encryption approach using keyword search has some drawbacks such as the privacy of the identity attributes of the users is not taken into account so that the data storage can learn some information about the users and the organization. The random keyword search request also cause loss of information and degrade the privacy of encrypted data. This thesis of two layer encryption allows more secure and private way to handle data updates, user dynamics and policy changes. If there is a change in user dynamics or policy the outer layer of encryption needs to be updated. Since the outer layer encryption is done at the data storage, no transmission of data required between the data owner and data storage. The user who satisfies the access control policies should be able to decrypt the keys twice in order to access the data makes the system more secure and private. Hence my propped thesis has a newly added advantage of two layer encryption using Attribute Based Group Key management (ABGKM) provides a strong secure layer for data storage in servers.

Authors and Affiliations

Ashly. k. Achenkunju.

Keywords

Related Articles

 Renal Calculi Detection in Ultrasound images and Diagnosis of Images using Image Segmentation

 Abstract: Now-a-days Renal Calculi is becoming a most common disease in both men and women. Calculi are due to abnormal collection of certain chemicals like oxalate, phosphate and uric acid. These calculi can be pr...

 Enhancing Data Security in WSN using Symmetric Key Algorithm

 Data aggregation is implemented in wireless sensor networks to reduce data redundancy and to summarize relevant and necessary information without requiring all pieces of the data and to reduce large amount of dat...

 Load Balancing In Public Cloud

 In present days cloud computing is one of the greatestplatform which provides storage of data in very lowercost and available for all time over the internet.But ithas more critical issue like security, load man...

 Improved Text Analysis Approach for Predicting Effects of Nutrient on Human Health using Machine Learning Techniques

 Abstract : A text analysis method is introduced which processes the unstructured information from document collection in order to support efficient text classification and information extraction. The Information ex...

Qos Parameters of an Energy Efficient Multicast Congestion Control Protocol (Eemccp) Over Fading Channels

In this paper we propose an energy efficient multicasting congestion control protocol for mobile ad hoc networks (MANETs) over fading channels. Our proposed scheme overcomes the disadvantages of existing multicast conges...

Download PDF file
  • EP ID EP163099
  • DOI -
  • Views 75
  • Downloads 0

How To Cite

Ashly. k. Achenkunju. (2014).  Privacy and Security in Data Storage Using Two Layer Encryption and MAC Verification. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 17-23. https://europub.co.uk/articles/-A-163099