CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Privacy Preserving and Effective User Revocation on Dynamic Groups using CP-ABE Scheme

by M. Sravani Kumari, K. Santhi, B. Tarakeswara Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 133 - Number 1
Year of Publication: 2016
Authors: M. Sravani Kumari, K. Santhi, B. Tarakeswara Rao
10.5120/ijca2016907722

M. Sravani Kumari, K. Santhi, B. Tarakeswara Rao . Privacy Preserving and Effective User Revocation on Dynamic Groups using CP-ABE Scheme. International Journal of Computer Applications. 133, 1 ( January 2016), 17-20. DOI=10.5120/ijca2016907722

@article{ 10.5120/ijca2016907722,
author = { M. Sravani Kumari, K. Santhi, B. Tarakeswara Rao },
title = { Privacy Preserving and Effective User Revocation on Dynamic Groups using CP-ABE Scheme },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 133 },
number = { 1 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 17-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume133/number1/23750-2016907722/ },
doi = { 10.5120/ijca2016907722 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:30:05.487241+05:30
%A M. Sravani Kumari
%A K. Santhi
%A B. Tarakeswara Rao
%T Privacy Preserving and Effective User Revocation on Dynamic Groups using CP-ABE Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 133
%N 1
%P 17-20
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a days the importance of cloud computing emerge with many sectors in order to reduce economical Cost and improve the revenue with improving cloud service usability like IaaS, SaaS and PaaS services. In this connection when group users outsource their data to the cloud among the dynamic group no assurance about user privacy ,data integrity due to lack of data leakage and modifications among group users ,such a case user authenticity , user data privacy and user revocation is to be a challenging issue with this system, thus to address all above issues we proposed a novel framework i.e. CP-ABE based secure public auditing for protecting data integrity and authenticity without compromising security and authenticity and also for effective user revocation on dynamic group members.

References
  1. S. Grance, “Draft NIST working definition of Data Server computing”.
  2. C. Wang, Q. Wang, K. Ren, and W. Lou, “Towards Secure and Dependable Storage Services in Cloud Computing,” IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220–232, 2011.
  3. Y. Zhu, G.-J. Ahn, H. Hu, S. S. Yau, H. G. An, and S. Chen, “Dynamic Audit Services for Outsourced Storage in Clouds,” IEEE Transactions on Services Computing, accepted.
  4. S. Marium, Q. Nazir, A. Ahmed, S. Ahthasham and Aamir M. Mirza, “Implementation of EAP with RSA for Enhancing The Security of Cloud Computing”, International Journal of Basic and Applied Science, vol 1, no. 3, pp. 177-183, 2012.
  5. Balkrishnan. S, Saranya. G, Shobana. S and Karthikeyan.S, “Introducing Effective Third Party Auditing (TPA) for Data Storage Security in Cloud”, International Journal of computer science and Technology, vol. 2, no. 2, ISSN 2229-4333 (Print) | ISSN: 0976- 8491(Online), June 2012.
  6. K. Kiran Kumar, K. Padmaja, P. Radha Krishna, “Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing”, International Journal of Computer science and Technology, vol. 3 pp, ISSN. 0976-8491(Online), pp. 936-940, ISSN: 2229- 4333 (Print), March 2012.
  7. Jachak K. B., Korde S. K., Ghorpade P. P. and Gagare G.J., “Homomorphic authentication with Random Masking Technique Ensuring Privacy & Security in Cloud Computing”, Bioinfo Security Informatics, vol. 2, no. 2, pp. 49-52, ISSN. 2249-9423, 12 April 2012.
  8. J. Yuan and S. Yu, “Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud,” in Proceedings of ACM ASIACCS-SCC’13, 2013.
  9. H. Shacham and B. Waters, “Compact Proofs of Retrievability,”in the Proceedings of ASIACRYPT 2008. Springer Verlag,2008,pp.90–107.
  10. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,”in the Proceedings of ACM CCS 2007, 2007, pp. 598–610.
Index Terms

Computer Science
Information Sciences

Keywords

CP-ABE Scheme User Revocation data integrity Privacy.