Enhanced Key Management with Attribute and Access Specification for Data Storage in Cloud Environment

Authors

  • Dr. D. I. George Amalarethinam  Bursar & Director (MCA), Associate Professor, Computer Science Department, Jamal Mohamed College(Autonomous), Tiruchirappalli,Tamil Nadu, India
  • H. M. Leena  Assistant Professor , Computer Science Department, Holy Cross College (Autonomous), Tiruchirappalli, Tamil Nadu, India

Keywords:

Cloud computing, Security, Attributes, Policy, Access Permission.

Abstract

Cloud Computing is an emerging technology with a collection of systems provisioning the resources like hardware, software, processing power, network, operating system, storage on pay-you-go basis. Cloud consumers can deploy these resources from various cloud service providers based on their requirements. Storing the users’ sensitive data in cloud is a critical task. Not only securing the data in a proper way is a major concern, but also the access privilege challenges due to the sharing of data stored in cloud is to be considered. The issue of controlling and preventing unauthorized access to data plays a vital role. Thus the access control and permissions on data must be set by the owners of the data based on certain attributes. Hence the proposed system specifies the policy with the given attributes and ensures the access control. This helps in protecting and accessing the data by providing the policy in the key for authenticating and authorizing. The data can be accessed on satisfying the policy and access permissions.

References

  1. Goyal V., Pandey O., Sahai A., Waters B., "Attribute-Based Encryption for Fine-Grained Access Control for Encrypted Data", Proceedings of the 13th Conference on Computerand Communications Security, pp. 89-98, 2006.
  2. Bethencourt, J., Sahai, A., Waters B., "Ciphertext-Policy Attribute-Based Encryption", Proceedings of the IEEE Symposium on Security and Privacy, pp. 321–334, 2007.
  3. Parmar Vipul Kumar J, Rajani Kanth Aluvalu, "Key Policy Attribute Based Encryption (KP-ABE): A Review", International Journal of Innovative and Emerging Research in Engineering, Vol. 2, No. 2, pp. 49-52, 2015.
  4. Muhammad Asim, Milan Petkovic, Tanya Ignatenko, "Attribute-based encryption with encryption and decryption outsourcing", Proceedings of the 12th Australian Information Security Management Conference, pp. 21-28, 2014.
  5. Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Au, "Improving privacy and security in decentralized ciphertext-policy attribute-based encryption", IEEE Transactions on Information Forensics and Security, Vol. 10, No. 3, pp. 665-678, 2015.
  6. Jin Sun, Yupu Hu, Leyou Zhang, "A Key-Policy Attribute-Based Broadcast Encryption", The International Arab Journal of Information Technology, Vol. 10, No. 5, pp. 444-453, 2013.
  7. Guangbo Wang, Jianhua Wang, "Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage", Mathematical Problems in Engineering, pp. 1-12, 2017.
  8. D. I. George Amalarethinam, H. M. Leena,  "A New Key Generation Technique Using GA for Enhancing Data Security in Cloud Environment", International Journal of Cloud Computing, 2017.(accepted to be published).
  9. D. I. George Amalarethinam, H. M. Leena, "Asymmetric Addition Chaining Cryptographic Algorithm (ACCA) for Data Security in Cloud", Springer Verlag, 2017. (accepted to be published).

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Dr. D. I. George Amalarethinam, H. M. Leena, " Enhanced Key Management with Attribute and Access Specification for Data Storage in Cloud Environment, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 8, pp.973-976, November-December-2017.