Preserving Privacy for Access Policies for Secure Data Storage in Clouds
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 7
Abstract
Cloud computing is well known for its ubiquitous behavior, as the users can store and avail the data from cloud at any point of time irrespective of the location through internet. In the current era, cloud computing is receiving lots of attention from the researchers to enhance the access control policies of the user in retrieving confidential data stored in the cloud. This paper addresses the problem of securing the highly sensitive data stored in the clouds. As the cloud server is aware of accessibility policy of each record stored in it, a novel and enhanced privacy preserving framework is proposed based on cipher-text policy attribute based encryption mechanism. In this case, the user can assign a security policy based on the attributes and restrict the unauthorized and anonymous users accessing the confidential data. In general, during cipher-text policy attributes based encryption cipher-texts are allied with access policies as well as the keys are allied attribute set. The proposed schema specifies that, it is not necessary to associate the access policy along with the cipher text such that the user privacy is guaranteed. For this purpose, Paillier algorithm is used for hiding user access policies.
Authors and Affiliations
K. Rohini , Dr. K. Madhavi
Survey on Clustering Techniques of Data Mining
The goal of this survey is to provide a comprehensive review of different clustering techniques in data mining. Data mining refers to extracting useful information from vast amounts of data. It is the process of discover...
Performance Analysis of Ad Hoc Routing Protocols in WSNs
The field of communications networks continues to emerge, thus leading to the rapid growth in the field of wireless sensor networks (WSNs). WSNs are noticeably different from traditional Ad hoc networks. The conspicuous...
Hand Written Digit Recognition Using Backpropagation Neural Network on Master-Slave Architecture
The objective of this work is to identify the hand written digits represented by rectangular box of 16x16 in a gray scale of 256 values. Backpropagation neural network (BPN) is one of the simplest models of supervised tr...
An Efficient Steganographic Scheme Using Skin Tone Detection and Discrete Wavelet Transformation
Steganography is a technique used for secret communication, in which secret information is embedded into a cover medium. The Secret information may be some text or image or even audio clip and the cover medium may be som...
A Systematic approach of Software development implementation process-Part I
This research paper most useful for all academics student of computer science. In this paper I have targeted all those student who works on their academic project. Since long time I found most of student not follow actua...