Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Privacy Preserving and Effective User Revocation on Dynamic Groups using CP-ABE Scheme

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
M. Sravani Kumari, K. Santhi, B. Tarakeswara Rao
10.5120/ijca2016907722

Sravani M Kumari, K Santhi and Tarakeswara B Rao. Article: Privacy Preserving and Effective User Revocation on Dynamic Groups using CP-ABE Scheme. International Journal of Computer Applications 133(1):17-20, January 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {M. Sravani Kumari and K. Santhi and B. Tarakeswara Rao},
	title = {Article: Privacy Preserving and Effective User Revocation on Dynamic Groups using CP-ABE Scheme},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {133},
	number = {1},
	pages = {17-20},
	month = {January},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

Now a days the importance of cloud computing emerge with many sectors in order to reduce economical Cost and improve the revenue with improving cloud service usability like IaaS, SaaS and PaaS services. In this connection when group users outsource their data to the cloud among the dynamic group no assurance about user privacy ,data integrity due to lack of data leakage and modifications among group users ,such a case user authenticity , user data privacy and user revocation is to be a challenging issue with this system, thus to address all above issues we proposed a novel framework i.e. CP-ABE based secure public auditing for protecting data integrity and authenticity without compromising security and authenticity and also for effective user revocation on dynamic group members.

References

  1. S. Grance, “Draft NIST working definition of Data Server computing”.
  2. C. Wang, Q. Wang, K. Ren, and W. Lou, “Towards Secure and Dependable Storage Services in Cloud Computing,” IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220–232, 2011.
  3. Y. Zhu, G.-J. Ahn, H. Hu, S. S. Yau, H. G. An, and S. Chen, “Dynamic Audit Services for Outsourced Storage in Clouds,” IEEE Transactions on Services Computing, accepted.
  4. S. Marium, Q. Nazir, A. Ahmed, S. Ahthasham and Aamir M. Mirza, “Implementation of EAP with RSA for Enhancing The Security of Cloud Computing”, International Journal of Basic and Applied Science, vol 1, no. 3, pp. 177-183, 2012.
  5. Balkrishnan. S, Saranya. G, Shobana. S and Karthikeyan.S, “Introducing Effective Third Party Auditing (TPA) for Data Storage Security in Cloud”, International Journal of computer science and Technology, vol. 2, no. 2, ISSN 2229-4333 (Print) | ISSN: 0976- 8491(Online), June 2012.
  6. K. Kiran Kumar, K. Padmaja, P. Radha Krishna, “Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing”, International Journal of Computer science and Technology, vol. 3 pp, ISSN. 0976-8491(Online), pp. 936-940, ISSN: 2229- 4333 (Print), March 2012.
  7. Jachak K. B., Korde S. K., Ghorpade P. P. and Gagare G.J., “Homomorphic authentication with Random Masking Technique Ensuring Privacy & Security in Cloud Computing”, Bioinfo Security Informatics, vol. 2, no. 2, pp. 49-52, ISSN. 2249-9423, 12 April 2012.
  8. J. Yuan and S. Yu, “Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud,” in Proceedings of ACM ASIACCS-SCC’13, 2013.
  9. H. Shacham and B. Waters, “Compact Proofs of Retrievability,”in the Proceedings of ASIACRYPT 2008. Springer Verlag,2008,pp.90–107.
  10. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,”in the Proceedings of ACM CCS 2007, 2007, pp. 598–610.

Keywords

CP-ABE Scheme, User Revocation, data integrity, Privacy.