Security and Protection of Enterprise Data in Cloud: Implementation of Deniable CP-ABE algorithm and Performance Considerations

Abstract

Enterprise level cloud data storage is gaining importance in the area of consumer level file hostage services. Cloud storage providers are responsible for availability, accessibility and protection of the user data. A number of encrypting schemes have been proposed for encrypting the user data in cloud storage to protect unauthorized access. Most of the Attribute Based Encryption (ABE) schemes that were proposed assume that the data in cloud storage are secure and are never disclosed. However, in reality, some of the authorities may force the cloud storage providers to disclose the cloud user’s secrets or personal data. In this paper, a new deniable ABE encryption scheme for cloud storage is proposed to ensure user privacy with minimized unauthorized access. A new ranking algorithm assigns a rank to each user at the time of registration based on their personal information. The rank of the user enhances the privacy and provides access control to the data stored on cloud. Each file uploaded to cloud is assigned with a rank and the file downloads only if the rank of the user matches the rank associated with the file. If rank of the user does not match then a fake file will be downloaded. Since authorities who demand for user secret cannot decide if the information they get about the user are legitimate, the cloud storage providers make sure that the individual user privacy is still protected. The ranking algorithm is also used to provide improved cloud access response time to prioritized users.

Authors and Affiliations

Vijaya Shetty S, Dr. Sarojadevi H, Shalini M, Sanivarapu Mounica, T S Vinutha, Sahana S

Keywords

Related Articles

FPGA Based Decimal Matrix Code for Passive RFID Tag

In this paper, Decimal Matrix Code is developed for RFID passive tag. The proposed DMC uses the decimal algorithm to obtain the maximum error detection and correction capability. The Encoder-Reuse Technique is used to mi...

Modelling Future Water Demand With WEAP Model: The Case Study of Marahoué Basin in Côte d’Ivoire

The Marahoué basin in west-central Côte d'Ivoire is a transitional zone between the Sudanese climate and the attenuated equatorial one. This duality favors agricultural and pastoral activities in relation to a population...

Surface Color Identification in Crust & Finished Leathers using K-Means Clustering Algorithm

In general, color identification on the surface level is carried out in the leather industry. Further, the leather is grouped by various parameters. Primarily it takes place through visual assessment only. This practice...

Some Mechanical Properties of Sugarcane at Different Sizes and Loadings Relevant to Design and Construction of Sugarcane Juice Extractor.

This study evaluated the mechanical properties of two varieties of sugarcane; Saccharumofficinarum and Saccharumbarberi. Some mechanical properties (rupture force, rupture energy, bio-yield force, bio-yield energy and de...

A Comprehensive Analysis and Comparison of TCP Reno and TCP New Reno

There are different TCP variations and each one place with the different criteria. In the mobile ad hoc networks, the topology changes habitually due to mobile nodes, this leads to significant packet losses and network t...

Download PDF file
  • EP ID EP391208
  • DOI 10.9790/9622-0705037983.
  • Views 142
  • Downloads 0

How To Cite

Vijaya Shetty S, Dr. Sarojadevi H, Shalini M, Sanivarapu Mounica, T S Vinutha, Sahana S (2017). Security and Protection of Enterprise Data in Cloud: Implementation of Deniable CP-ABE algorithm and Performance Considerations. International Journal of engineering Research and Applications, 7(5), 79-83. https://europub.co.uk/articles/-A-391208