Security and Protection of Enterprise Data in Cloud: Implementation of Deniable CP-ABE algorithm and Performance Considerations
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 5
Abstract
Enterprise level cloud data storage is gaining importance in the area of consumer level file hostage services. Cloud storage providers are responsible for availability, accessibility and protection of the user data. A number of encrypting schemes have been proposed for encrypting the user data in cloud storage to protect unauthorized access. Most of the Attribute Based Encryption (ABE) schemes that were proposed assume that the data in cloud storage are secure and are never disclosed. However, in reality, some of the authorities may force the cloud storage providers to disclose the cloud user’s secrets or personal data. In this paper, a new deniable ABE encryption scheme for cloud storage is proposed to ensure user privacy with minimized unauthorized access. A new ranking algorithm assigns a rank to each user at the time of registration based on their personal information. The rank of the user enhances the privacy and provides access control to the data stored on cloud. Each file uploaded to cloud is assigned with a rank and the file downloads only if the rank of the user matches the rank associated with the file. If rank of the user does not match then a fake file will be downloaded. Since authorities who demand for user secret cannot decide if the information they get about the user are legitimate, the cloud storage providers make sure that the individual user privacy is still protected. The ranking algorithm is also used to provide improved cloud access response time to prioritized users.
Authors and Affiliations
Vijaya Shetty S, Dr. Sarojadevi H, Shalini M, Sanivarapu Mounica, T S Vinutha, Sahana S
A review on Types of Roughness Element Used in Solar Air Heater to Enhance Heat Transfer Coefficient
Solar air heaters provides the efficient use of solar energy, which uses the absorber plate to absorb the incoming solar radiations, converting it to thermal energy at its surface, and transferring the thermal energy to...
Implementing Method of Ensemble Empirical Mode Decomposition And Recurrent Neural Network For Gold Price Forecasting
Gold becomes one of long-term investment options and is used as a value protection against inflation or declining other assets. These gold price fluctuations tend to be nonlinear and uncertain. Most researchers and busin...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniable CP-ABE algorithm and Performance Considerations
Enterprise level cloud data storage is gaining importance in the area of consumer level file hostage services. Cloud storage providers are responsible for availability, accessibility and protection of the user data. A nu...
Sonar Target Characterization and Echo Separation Using the Fractional Fourier Transform and its Relation to the Wigner Distribution
In this paper, we apply the relationship between the Fractional Fourier Transform (FrFT) and the Wigner Distribution (WD) to identify and separate echoes from an active sonar based upon the characteristics of different t...
Sustainable Supply Chain System Model in Small and Medium Enterprise Furniture with Interpretive Structural Modeling (ISM) Approach
SMEs furniture Pasuruan Indonesia is a business actor who processes wood from forest products into goods that can add value to wood production. This SMEs furniture is also one of the superior products of Pasuruan Regency...