CFP last date
20 May 2024
Reseach Article

A Survey on Hierarchical Attribute Set based Encryption (HASBE) Access Control Model for Cloud Computing

by Vanraj Kamliya, Rajnikanth Aluvalu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 7
Year of Publication: 2015
Authors: Vanraj Kamliya, Rajnikanth Aluvalu
10.5120/19676-1399

Vanraj Kamliya, Rajnikanth Aluvalu . A Survey on Hierarchical Attribute Set based Encryption (HASBE) Access Control Model for Cloud Computing. International Journal of Computer Applications. 112, 7 ( February 2015), 4-7. DOI=10.5120/19676-1399

@article{ 10.5120/19676-1399,
author = { Vanraj Kamliya, Rajnikanth Aluvalu },
title = { A Survey on Hierarchical Attribute Set based Encryption (HASBE) Access Control Model for Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 7 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 4-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number7/19676-1399/ },
doi = { 10.5120/19676-1399 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:48:47.497241+05:30
%A Vanraj Kamliya
%A Rajnikanth Aluvalu
%T A Survey on Hierarchical Attribute Set based Encryption (HASBE) Access Control Model for Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 7
%P 4-7
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing refers to the application and service that run on a distributed system using virtualized resources and access by common internet protocol and networking standard. Cloud computing virtualizes system by pooling and sharing resources. System and resources can be monitored from central infrastructure as needed. It requires high security because of now a days companies going to put more essential and huge amount of data on cloud. That's why the reason traditional access control is not enough For the High security . so that the attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing with the complex access control policy. in this paper, we have proposed hierarchical attribute-set-based encryption (HASBE) access control by extending cipher-text policy and attribute-set-based encryption (ASBE) with a hierarchical structure of users. HASBE provides Flexibility, scalability and fine-grained access control with efficient user revocation but the hierarchical structure of the domain hierarchy is to complex and there is no sub-domain level user hierarchy which increases system response time and decreases the system performance. So we are proposing HASBE scheme by creating a sub domain in to the user level Hierarchy that reduce the complexity of the hierarchy and also improve the system performance.

References
  1. Zhiguo Wan, Jun'e Liu, and Robert H. Deng, Senior Member, IEEE ," HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing"in IEEE transection on information forensic and security . , vol. 7, no. 2, April 2012
  2. Sanchal Ramteke, Purva modi, Apurva Raghojiwar, Vijaya Karad, Prof. P. D. Kale. ,"HASBE: Hierarchical Attribute based solution for flexible and scalable access control in cloud computing-in International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014
  3. Rajanikanth aluvalu,lakshmi Muddana," A Survey on Access Control Models in Cloud Computing"-in Springer International Publishing, Advances in Intelligent Systems and Computing 337, DOI: 10. 1007/978-3-319-13728-5_7.
  4. N. krishna. L. Bhavani," HASBE: A Hierarchical Attribute Set Based Encryption For Flexible, Scalable And Fine Grained Access Control In Cloud Computing-International Journal of Computer & Organization Trends –Volume 3 Issue 9 – Oct 2013.
  5. Md. Akram Ali, Ch. Pravallika, P. V. S. Srinivas," Multi-Attribute Based Access Control Policy Enforcement for File Accesses in Cloud"-in International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September 2013
  6. John Bethencourt, Computer Sciences Department Carnegie Mellon University," Intro to Bilinear Maps"
  7. A. Sahai and B. Waters, "Fuzzy identity-based encryption," inProc. EUROCRYPT, 2005, pp. 457473
  8. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attibute-based encryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Alexandria, VA, 2006.
  9. J. Bettencourt, A. Sahai, and B. Waters"Ciphertext-policy attribute based encryption "in Proceedings of IEEE Symposium on Security and Privacy, pp. 321V334, 2007.
  10. Q. Liu, G. Wang, and J. Wu, "Time based proxy re-encryption scheme for secure data sharing in a cloud environment," Information Sciences . In Press, 2012.
  11. S. Gokuldev, 2S. Leelavathi 1Associate Professor, 2PG Scholar Department of Computer Science and Engineering SNS College of Engineering, Coimbatore, India," HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control by Separate Encryption/Decryption in Cloud Computing"-in International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013
  12. Zhibin Zhou and Dijiang Huang Arizona State University On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
  13. Minu George1, Dr. C. Suresh Gnanadhas2, Saranya. K3," A Survey on Attribute Based Encryption Scheme in Cloud Computing"-in International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 11, November 2013
  14. B. Raja Sekhar,B. Sunil Kumar, L. Swathi Reddy, V. PoornaChandar," CP-ABE Based Encryption for Secured Cloud Storage Access"-in International Journal of Scientific & Engineering Research, Volume 3, Issue 9, September-2012
  15. Mauro José A. de Melo, Zair Abdelouahab," A STUDY OF ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT" in International Journal of Computers & Technolog Volume 3 No. 3, Nov-Dec, 2012
  16. Punithasurya K, Jeba Priya S," Analysis of Different Access Control Mechanism in Cloud" in International Journal of Applied Information Systems (IJAIS) – ISSN: 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 4– No. 2, September 2012
Index Terms

Computer Science
Information Sciences

Keywords

Access Control Attribute Cloud computing Encryption Decryption Data Security