Security Preserved Data Acquisition Process for Keen Grid Applications Using Cloud Innovation

Authors(2) :-P. Raghavan, S. Edwin Raja

The progressions made in the savvy meters have empowered the mechanized procedure of the charging arrangement of purchaser electrical utilization. So as to mechanize the errand of charging frameworks, cloud based charging model has been recommended. This sort of open source model can be effortlessly recognizable and altered by the outsider assailants. Henceforth, information security is the major worry amid information procurement and transmission process. This paper devises the cipher text arrangement-Attribute Based Encryption(CP-ABE) for accomplishing productive and anchored information learning show for the shrewd matrix frameworks. A community oriented key is produced for unscrambling the information for the approved client that upgrades the security of the framework. At first, they got information is protected with the entrance control approaches. The information proprietor who has the synergistic key can get to the touchy information or disaster will be imminent, the trait repudiation show confines the information consent. Thus, we can reluctantly illuminate the key escrow issues with diminished capacity utilization in the cloud information sharing frameworks. Trial examination has demonstrated the productivity of the proposed CP-ABE as far as time taken for key age, encryption and unscrambling process. It delineates that the proposed CP-ABE performed better.

Authors and Affiliations

P. Raghavan
Assistant Professor, Department of Computer Science and Engineering, P. S. R Engineering College, Sevalpatti, Sivakasi, Virudhunagar, Tamil Nadu, India
S. Edwin Raja
Assistant Professor, Department of Computer Science and Engineering, P. S. R Engineering College, Sevalpatti, Sivakasi, Virudhunagar, Tamil Nadu, India

Smart Meter, Energy, Power Consumption, Privacy, Cloud Assisted Systems And Smart Grid.

  1. Zhitao Guan et al, “Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid”, IEEE internet of things, 2016.
  2. J. Bethencourt, A. Sahai, and B.Waters, “Ciphertext-policy attribute-based encryption,” in Proc. IEEE Symp. Secur. Privacy,2007, pp. 321-334.
  3. N. Attrapadung and H. Imai, “Conjunctive broadcast and attribute-based encryption,” in Proc. Int. Conf. Pairing-Based Cryptography, 2009, pp. 248-265.
  4. B. Waters, “Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization,” in Proc. Public Key Cryptography, 2011, pp. 53-70.
  5. M. Green, S. Hohnberger, and B. Waters, “Outsourcing the decryption of ABE ciphertext,” in Proc. USENIX Secur. Symp., 2011, pp. 34.
  6. J. Lai, R. H. Deng, C. Guan, and J. Weng, “Attribute-based encryption with verifiable outsourced decryption,” IEEE Trans. Inf. Forens. Security, vol. 8, no. 8, pp. 1343-1354, 2013.
  7. S. Lin, R. Zhang, H. Ma, and M. Wang, “Revisiting attribute-based encryption with verifiable outsourced decryption,” IEEE Trans. Inf. Forens. Security, vol. 10, no. 10, pp. 2119-2130, 2015.
  8. M. Chase, and S. S. M. Chow, “Improving privacy and security in multi-authority attribute-based encryption,” in Proc. ACM CCS, 2009, 121-130.
  9. G. Zhang, L. Liu, and Y. Liu, “An attribute-based encryption scheme secure against malicious KGC,” in Proc. TRUSTCOM, 2012, pp. 1376-1380.
  10. J. Hur, “Improving security and efficiency in attribute-based data sharing,” IEEE Trans. Knowl. Data. Eng., vol. 25, no. 10, pp. 2271-2282, 2013.
  11. P. P. Chandar, D. Mutkurman, and M. Rathinrai, “Hierarchical attribute based proxy reencryption access control in cloud computing,” in Proc. ICCPCT, 2014, pp. 1565-1570.
  12. X. A. Wang, J. Ma, and F. Xhafa, “Outsourcing decryption of attributebased encryption with energy efficiency,” in Proc. 3PGCIC, 2015, pp.444-448.
  13. L. Cheung, and C. Newport, “Provably secure ciphertext policy ABE,”in Proc. ACM CCS, 2007, pp. 456-465.
  14. J. Hur, and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems,” IEEE Trans. Parallel Distrib.Syst., vol. 22, no. 7, pp. 1214-1221, 2011.
  15. M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure attribute-based systems,” in Proc. ACM CCS, 2006, pp. 99-112.
  16. A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in Proc. ACM CCS, 2008, pp. 417-426.
  17. A. Xiong, C. Xu, and Q. Gan, “A CP-ABE scheme with system attributes revocation in cloud storage,” in Proc. ICCWAMIP, 2014, pp.331-335.
  18. Q. Wu, “A generic construction of ciphertext-policy attribute-based encryption supporting attribute revocation,” China Commun., vol. 11, no. 13, pp. 93-100, 2014.
  19. S. S. M. Chow, “Removing escrow from identity-based encryption,” in Proc. Int. Conf. Practice and Theory in Public Key Cryptography,2009, pp. 256-276.
  20. M. S. Ahmad, N. E. Musa, R. Nadarajah, R. Hassan, and N. E.Othman, “Comparison between android and iOS operating system in terms of security,” in Proc. CITA, 2013, pp. 1-4.

Publication Details

Published in : Volume 6 | Issue 1 | January-February 2019
Date of Publication : 2019-01-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 298-302
Manuscript Number : IJSRSET196162
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

P. Raghavan, S. Edwin Raja, " Security Preserved Data Acquisition Process for Keen Grid Applications Using Cloud Innovation, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 6, Issue 1, pp.298-302, January-February-2019. Available at doi : https://doi.org/10.32628/IJSRSET196162      Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET196162

Article Preview