Security and Protection of Enterprise Data in Cloud: Implementation of Deniable CP-ABE algorithm and Performance Considerations
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 5
Abstract
Enterprise level cloud data storage is gaining importance in the area of consumer level file hostage services. Cloud storage providers are responsible for availability, accessibility and protection of the user data. A number of encrypting schemes have been proposed for encrypting the user data in cloud storage to protect unauthorized access. Most of the Attribute Based Encryption (ABE) schemes that were proposed assume that the data in cloud storage are secure and are never disclosed. However, in reality, some of the authorities may force the cloud storage providers to disclose the cloud user’s secrets or personal data. In this paper, a new deniable ABE encryption scheme for cloud storage is proposed to ensure user privacy with minimized unauthorized access. A new ranking algorithm assigns a rank to each user at the time of registration based on their personal information. The rank of the user enhances the privacy and provides access control to the data stored on cloud. Each file uploaded to cloud is assigned with a rank and the file downloads only if the rank of the user matches the rank associated with the file. If rank of the user does not match then a fake file will be downloaded. Since authorities who demand for user secret cannot decide if the information they get about the user are legitimate, the cloud storage providers make sure that the individual user privacy is still protected. The ranking algorithm is also used to provide improved cloud access response time to prioritized users.
Authors and Affiliations
Vijaya Shetty S, Dr. Sarojadevi H, Shalini M, Sanivarapu Mounica, T S Vinutha, Sahana S
Numerical Solution of Klein–Gordon and Sine-Gordon Equations Using the Numerical Method of Gridless Lines
Over The Past 30 Years, Analytical, Laboratory And Numerical Studies Have Been Carried Out On The Equations With A Soliton Response, And Several Nonlinear Equations With Similar Characteristics Were Presented. Using The...
Representation of Integer Positive Number as A Sum of Natural Summands
In this paper the problem of representation of integer positive number as a sum of natural terms is considered. The new approach to calculation of number of representations is offered. Results of calculations for numbers...
Review on Effective utilization of RCC Shear walls for Design of Soft Storey Buildings
Multi-storey buildings in metropolitan cities require open taller first storey for parking of vehicle and/or for retail shopping, large space for meeting room or a banking hall owing to lack of horizontalspace and high c...
The Effects of Heat on Electronic Components
Regardless of the cause of overheating, the general and primary effect of overheating on an electronic component is damage. In this paper, the effects of excessive levels heat on different types of electronic components...
Functional Level Data Acquisition Requirement Specification Formulation for Embedded Systems: Challenges, Experiences and Guidelines
With the advancement in technology, many features of the large scale application systems are being embedded and miniaturized. This has led to investment of significant efforts on testing and verification of the developed...