Security and Protection of Enterprise Data in Cloud: Implementation of Deniable CP-ABE algorithm and Performance Considerations

Abstract

Enterprise level cloud data storage is gaining importance in the area of consumer level file hostage services. Cloud storage providers are responsible for availability, accessibility and protection of the user data. A number of encrypting schemes have been proposed for encrypting the user data in cloud storage to protect unauthorized access. Most of the Attribute Based Encryption (ABE) schemes that were proposed assume that the data in cloud storage are secure and are never disclosed. However, in reality, some of the authorities may force the cloud storage providers to disclose the cloud user’s secrets or personal data. In this paper, a new deniable ABE encryption scheme for cloud storage is proposed to ensure user privacy with minimized unauthorized access. A new ranking algorithm assigns a rank to each user at the time of registration based on their personal information. The rank of the user enhances the privacy and provides access control to the data stored on cloud. Each file uploaded to cloud is assigned with a rank and the file downloads only if the rank of the user matches the rank associated with the file. If rank of the user does not match then a fake file will be downloaded. Since authorities who demand for user secret cannot decide if the information they get about the user are legitimate, the cloud storage providers make sure that the individual user privacy is still protected. The ranking algorithm is also used to provide improved cloud access response time to prioritized users.

Authors and Affiliations

Vijaya Shetty S, Dr. Sarojadevi H, Shalini M, Sanivarapu Mounica, T S Vinutha, Sahana S

Keywords

Related Articles

Sustainability of Solid Waste Management System in Urban Areas of Pakistan: Stakeholders Perspective

Sustainability of solid waste management system in Pakistan like other developing countries is a growing challenge. Stakeholders are vital for the successful running of solid waste management system and timely inclusion...

Adsorption Studies of Acetic Acid Removal from Waste Water Using Seeds of Brassica Nigra

The present work investigates the potential use of biosorbent prepared from the seeds of Brassica nigra commonly called as ‘Black Mustard’ for the removal of acetic acid from wastewater. Environmental problems are growin...

Drought Index Analizes With Rainfall Patern Indicators Use SPI Method (Case Study Bangga Watershed)

Irregular weather and climate changes caused by El – Nino effect drought in some areas, including in Indonesia. The location of this study lies in the Bangga watershed. The purpose of this study was to determine rainfall...

Digital Image Processing Assessment in Multi Slice CT Angiogram using Liner, Non-Liner and Both Classifiers

Nowadays with heart diseases most of peoples are dying lock process to find problem agile fashion in remote areas. In this research help to peoples who are staying remote also to find problem in heart on which location a...

Experimetnal Investigation on Delamination of Nanocomposite Laminates

The principal mode of failure of layered composites is the separation along the interfaces of the layers, viz. delamination. This type of failure is induced by interlaminar tension and shear that developed due to variety...

Download PDF file
  • EP ID EP391208
  • DOI 10.9790/9622-0705037983.
  • Views 127
  • Downloads 0

How To Cite

Vijaya Shetty S, Dr. Sarojadevi H, Shalini M, Sanivarapu Mounica, T S Vinutha, Sahana S (2017). Security and Protection of Enterprise Data in Cloud: Implementation of Deniable CP-ABE algorithm and Performance Considerations. International Journal of engineering Research and Applications, 7(5), 79-83. https://europub.co.uk/articles/-A-391208