Security and Protection of Enterprise Data in Cloud: Implementation of Deniable CP-ABE algorithm and Performance Considerations

Abstract

Enterprise level cloud data storage is gaining importance in the area of consumer level file hostage services. Cloud storage providers are responsible for availability, accessibility and protection of the user data. A number of encrypting schemes have been proposed for encrypting the user data in cloud storage to protect unauthorized access. Most of the Attribute Based Encryption (ABE) schemes that were proposed assume that the data in cloud storage are secure and are never disclosed. However, in reality, some of the authorities may force the cloud storage providers to disclose the cloud user’s secrets or personal data. In this paper, a new deniable ABE encryption scheme for cloud storage is proposed to ensure user privacy with minimized unauthorized access. A new ranking algorithm assigns a rank to each user at the time of registration based on their personal information. The rank of the user enhances the privacy and provides access control to the data stored on cloud. Each file uploaded to cloud is assigned with a rank and the file downloads only if the rank of the user matches the rank associated with the file. If rank of the user does not match then a fake file will be downloaded. Since authorities who demand for user secret cannot decide if the information they get about the user are legitimate, the cloud storage providers make sure that the individual user privacy is still protected. The ranking algorithm is also used to provide improved cloud access response time to prioritized users.

Authors and Affiliations

Vijaya Shetty S, Dr. Sarojadevi H, Shalini M, Sanivarapu Mounica, T S Vinutha, Sahana S

Keywords

Related Articles

VLSI Modeling of High Performance Aging Aware Multiplier By Using Adaptive Hold Logic Circuit

Digital multipliers are most critical Arithmetic Logic Units. The performance of ALU systems depends on the throughput of the multiplier. In VLSI, the negative bias temperature instability effect occurs when a pmos Trans...

Development and Application of Interactive Virtual Tour to Berdyansk State Pedagogical University

Introduction of modern computer technologies, namely the development of interactive virtual objects in the learning process can achieve significant results in terms of dynamic update of the educational process organizati...

Investigation of contamination of phosphorus pesticides in the groundwater of Varamin Plain

Worldwide, insects and pests, including those that are less sustainable in the environment, are causing millions of dollars of damage to crops every year.Usually, after spraying and granulation in agricultural fields, re...

Multifunctional Smart Energy System By Internet Of Things

In present era, water scarcity occurs in agricultural sector. Therefore an automatic plant irrigation system has to be designed for the proper water supply in the fields. This project deals with an automatic plant irriga...

Understanding the Cognitive Theory of Multimedia Learning

A cognitive theory of multimedia learning details the human information processing system that includes dual channels for visual/pictorial and auditory/verbal processing. Each channel has limited capacity for processing....

Download PDF file
  • EP ID EP391208
  • DOI 10.9790/9622-0705037983.
  • Views 122
  • Downloads 0

How To Cite

Vijaya Shetty S, Dr. Sarojadevi H, Shalini M, Sanivarapu Mounica, T S Vinutha, Sahana S (2017). Security and Protection of Enterprise Data in Cloud: Implementation of Deniable CP-ABE algorithm and Performance Considerations. International Journal of engineering Research and Applications, 7(5), 79-83. https://europub.co.uk/articles/-A-391208