Preserving Privacy for Access Policies for Secure Data Storage in Clouds
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 7
Abstract
Cloud computing is well known for its ubiquitous behavior, as the users can store and avail the data from cloud at any point of time irrespective of the location through internet. In the current era, cloud computing is receiving lots of attention from the researchers to enhance the access control policies of the user in retrieving confidential data stored in the cloud. This paper addresses the problem of securing the highly sensitive data stored in the clouds. As the cloud server is aware of accessibility policy of each record stored in it, a novel and enhanced privacy preserving framework is proposed based on cipher-text policy attribute based encryption mechanism. In this case, the user can assign a security policy based on the attributes and restrict the unauthorized and anonymous users accessing the confidential data. In general, during cipher-text policy attributes based encryption cipher-texts are allied with access policies as well as the keys are allied attribute set. The proposed schema specifies that, it is not necessary to associate the access policy along with the cipher text such that the user privacy is guaranteed. For this purpose, Paillier algorithm is used for hiding user access policies.
Authors and Affiliations
K. Rohini , Dr. K. Madhavi
TOWARDS DEVELOPMENT OF CLOUD OPERATING SYSTEMS
Cloud operating system provides the abstraction of complex physical datacenter infrastructure by providing different interfaces for local and remote users. It manages the interaction between aplications and their interfa...
A SURVEY ON SECURING MANETS FROM MALICIOUS BEHAVIOR BY DETECTION MECHANISM
There is a migration from wired network to wireless network in last few years due to the property of mobility and scalability. Mobile Ad hoc network is an infrastructure less network. Each node in Mobile Ad hoc Network a...
Prediction model for bug re-opens in Mozilla Firefox
Bug fixing becomes the most crucial activity in the software development process. Fixing bugs accounts a large amount of time of software development task. Sometimes these bug fixes are incomplete or inappropriate and re...
Technical Review of Comparative Study on Different Algorithms of Image Inpainting
Image inpainting is the technique of restoring the lost or damaged regions or modifying the image contents imperceptibly. Image inpainting can be used to fill in the missing area in an image which is visible to human eye...
Recognition of Handwritten Tamil Characters using Wavelet
During early days many research works have been carried out for the Online Characters. But few research works have been proposed for the Offline characters especially for South Indian Languages at the early stages and no...