Privacy and Security in Data Storage Using Two Layer Encryption and MAC Verification
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: For the privacy and security of data stored in data storage a new Two Layer Encryption (TLE) approach is developed. This technique performs an encryption at two layers based on some ACP(Access Control Policies)on the data owner as well as on the datastorage.The data owner and the data storage utilizes a key management scheme with the help of a key generating algorithmABGKM (Attribute Based Group Key Management)whereby the actual keys do not need to be distributed by the users. The single layer encryption approach using keyword search has some drawbacks such as the privacy of the identity attributes of the users is not taken into account so that the data storage can learn some information about the users and the organization. The random keyword search request also cause loss of information and degrade the privacy of encrypted data. This thesis of two layer encryption allows more secure and private way to handle data updates, user dynamics and policy changes. If there is a change in user dynamics or policy the outer layer of encryption needs to be updated. Since the outer layer encryption is done at the data storage, no transmission of data required between the data owner and data storage. The user who satisfies the access control policies should be able to decrypt the keys twice in order to access the data makes the system more secure and private. Hence my propped thesis has a newly added advantage of two layer encryption using Attribute Based Group Key management (ABGKM) provides a strong secure layer for data storage in servers.
Authors and Affiliations
Ashly. k. Achenkunju.
Non-Cooperative Eavesdropping Resisted Using Ford-Fulkerson And AES By Secure coding
Abstract: A wireless sensor network is usually composed of a large number of spatially distributed autonomous sensor nodes. Advancement in the field of modern communication networks especially in the wireless netwo...
Node Replication Attack Detection Algorithms in Wireless Sensor Networks: A Survey.
Abstract: The sensor networks are often deployed in hostile environments and are not attended for long time. Deployment of these networks is increased in the recent years, as they help in monitoring and analyzing d...
Nymble: Blocking Misbehaving Users In Anonymizing Networks
The advent of anonymizing networks assured that users could access internet services with complete privacy avoiding any possible hindrance. This arrangement where series of routers form a network, hide the ...
A novel algorithm to protect and manage memory locations
Abstract: Most of security vulnerabilities continue to be caused by memory errors, and long-running programsthat interact with untrusted components. While comprehensive solutions have been developed to handle memor...
An Efficient Resource Allocation with Adaptive Rate Scheduling For WCDMA Networks
Abstract: WCDMA is a spread spectrum technique that uses a unique spreading code to spread the data before transmission based on its orthogonal property. WCDMA is mainly used for 3rd generation cellular and mobilenetwork...