Data Revocation System Over Cloud
Keywords:
Access control, ABE-key, multiauthority, verification, MD-5, AEsAbstract
Cloud era brought revolution of computerization world. One can access the data from anywhere and at any time with different devices. In this paper, we propose a secure data retrieval system using Attribute Based Encryption for the centralized database over cloud. Where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed to multiple authorize user over cloud. Using ABE key the prevention of unauthorized data access is done and maintains data security.
References
- Secure Data Retrieval for Decentralized Disruption Tolerant Military Networks, Junbeom Hur and Kyungtae Kang, Member, IEEE, ACM- (year-2014).
- O.P. Kreidl and T.M. Frazier, “Feedback Control Applied to Survivability: A Host-Based Autonomic Defense System,”IEEE Trans. Reliability, vol. 53, no. 1, pp. 148-166, Mar. 2004.
- J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: Routing for vehicle-based disruption tolerant networks,” in Proc.IEEE INFOCOM, 2006
- M. Chuah and P. Yang, “Node density-based adaptive routing scheme for disruption tolerant networks,” in Proc. IEEE MILCOM, 2006
- M. M. B. Tariq, M. Ammar, and E. Zequra, “Message ferry route design for sparse ad hoc networks with mobile nodes,” in Proc. ACM
- S. Roy and M. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs,” Lehigh CSE Tech. Rep., 2009
- D. Ragsdale, C. Carver, J. Humphries, and U. Pooch, “Adaptation Techniques for Intrusion Detection and Intrusion Response System,” Proc. IEEE Int’l Conf. Systems, Man, and Cybernetics, pp. 2344-2349, 2000.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.