Enhanced Key Management with Attribute and Access Specification for Data Storage in Cloud Environment

Authors(2) :-Dr. D. I. George Amalarethinam, H. M. Leena

Cloud Computing is an emerging technology with a collection of systems provisioning the resources like hardware, software, processing power, network, operating system, storage on pay-you-go basis. Cloud consumers can deploy these resources from various cloud service providers based on their requirements. Storing the users’ sensitive data in cloud is a critical task. Not only securing the data in a proper way is a major concern, but also the access privilege challenges due to the sharing of data stored in cloud is to be considered. The issue of controlling and preventing unauthorized access to data plays a vital role. Thus the access control and permissions on data must be set by the owners of the data based on certain attributes. Hence the proposed system specifies the policy with the given attributes and ensures the access control. This helps in protecting and accessing the data by providing the policy in the key for authenticating and authorizing. The data can be accessed on satisfying the policy and access permissions.

Authors and Affiliations

Dr. D. I. George Amalarethinam
Bursar & Director (MCA), Associate Professor, Computer Science Department, Jamal Mohamed College(Autonomous), Tiruchirappalli,Tamil Nadu, India
H. M. Leena
Assistant Professor , Computer Science Department, Holy Cross College (Autonomous), Tiruchirappalli, Tamil Nadu, India

Cloud computing, Security, Attributes, Policy, Access Permission.

  1. Goyal V., Pandey O., Sahai A., Waters B., "Attribute-Based Encryption for Fine-Grained Access Control for Encrypted Data", Proceedings of the 13th Conference on Computerand Communications Security, pp. 89-98, 2006.
  2. Bethencourt, J., Sahai, A., Waters B., "Ciphertext-Policy Attribute-Based Encryption", Proceedings of the IEEE Symposium on Security and Privacy, pp. 321–334, 2007.
  3. Parmar Vipul Kumar J, Rajani Kanth Aluvalu, "Key Policy Attribute Based Encryption (KP-ABE): A Review", International Journal of Innovative and Emerging Research in Engineering, Vol. 2, No. 2, pp. 49-52, 2015.
  4. Muhammad Asim, Milan Petkovic, Tanya Ignatenko, "Attribute-based encryption with encryption and decryption outsourcing", Proceedings of the 12th Australian Information Security Management Conference, pp. 21-28, 2014.
  5. Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Au, "Improving privacy and security in decentralized ciphertext-policy attribute-based encryption", IEEE Transactions on Information Forensics and Security, Vol. 10, No. 3, pp. 665-678, 2015.
  6. Jin Sun, Yupu Hu, Leyou Zhang, "A Key-Policy Attribute-Based Broadcast Encryption", The International Arab Journal of Information Technology, Vol. 10, No. 5, pp. 444-453, 2013.
  7. Guangbo Wang, Jianhua Wang, "Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage", Mathematical Problems in Engineering, pp. 1-12, 2017.
  8. D. I. George Amalarethinam, H. M. Leena,  "A New Key Generation Technique Using GA for Enhancing Data Security in Cloud Environment", International Journal of Cloud Computing, 2017.(accepted to be published).
  9. D. I. George Amalarethinam, H. M. Leena, "Asymmetric Addition Chaining Cryptographic Algorithm (ACCA) for Data Security in Cloud", Springer Verlag, 2017. (accepted to be published).

Publication Details

Published in : Volume 3 | Issue 8 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 973-976
Manuscript Number : IJSRSET1738260
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Dr. D. I. George Amalarethinam, H. M. Leena, " Enhanced Key Management with Attribute and Access Specification for Data Storage in Cloud Environment, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 8, pp.973-976, November-December-2017. Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET1738260

Article Preview