CFP last date
20 May 2024
Reseach Article

Secure Data Retrieval based on Attribute-based Encryption in Cloud

by Chaudhari Swapnil H., Mandre B.R.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 13
Year of Publication: 2016
Authors: Chaudhari Swapnil H., Mandre B.R.
10.5120/ijca2016908166

Chaudhari Swapnil H., Mandre B.R. . Secure Data Retrieval based on Attribute-based Encryption in Cloud. International Journal of Computer Applications. 134, 13 ( January 2016), 31-35. DOI=10.5120/ijca2016908166

@article{ 10.5120/ijca2016908166,
author = { Chaudhari Swapnil H., Mandre B.R. },
title = { Secure Data Retrieval based on Attribute-based Encryption in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 13 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number13/23977-2016908166/ },
doi = { 10.5120/ijca2016908166 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:34:09.387236+05:30
%A Chaudhari Swapnil H.
%A Mandre B.R.
%T Secure Data Retrieval based on Attribute-based Encryption in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 13
%P 31-35
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing plays important role in the development of IT industry. It can help a small organization to headway their business. An organization can progress from small scale industry to large scale industry. “Cloud” basically internet based data, network, resource storage. Meanwhile security, integrity, confidentiality requirement need must be achieve by cloud implementation. Attribute based encryption policy provides efficient encryption of data. Hierarchical implementation implies that an organization able to assign different privileges to users according to their role, using a top to bottom approach. Cloudsim has made virtual environment of cloud for developers. It connects to virtual resources according to user requirement of network resources. This paper describes the implementation of Hierarchical attribute base encryption scheme on cloudsim tool. Implementing attribute based encryption where rijndael algorithm used to encrypt data. Also paper include efficiency of encryption and decryption scheme used in implementation

References
  1. Zhiguo Wan, Jun’e Liu, and Robert H. Deng, ”HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing”, in IEEE Transactions on information forensics and security, Vol. 7, No. 2, in April 2012.
  2. Schucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou,” Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc IEEE INFOCOM,2010.
  3. A.Sahai and B.Waters,”Fuzzy Identity Based Encryption,” In Proc. Advances in Cryptology- Eurocrypt,2005, vol.3494,pp.457-473.
  4. S.Muller, S.Katzenbeisser, and C.Eckert,” Distributed attribute-based encryption,”in Proc.11th Int.Conf.Information Security and Cryptology, 2008,pp.20-36, Springer.
  5. J.Hur and Dong Kun Noh,” Attribute-Based Control with Efficient Revocation in Data Outsourcing systems,” IEEE Transactions on Parallel and Distributed Systems,Vol.22, No.7,July 2011.
  6. V.Goyal, O.Pandey, A.Sahai and B.Waters, “Attribute- based encryption for fine-grained acess control of encrypted data,” in Proc.ACM Conf.Computer and Communications(ACM CCS), Alexandria,VA,2006.
  7. J.Bethencourt, A. Sahai, and B.Waters, “Ciphertext-policy attribute based encryption,” in Proc.IEEE Symp. Security and Privacy, Oakland, CA,2007.
  8. R.Bobba, H.Khurana and M.Prabhakaran,” Attribute-sets: A practically motivated enhanced to attribute-based encryption,” in Proc.ESORICS, Saint Malo, France, 2009.
  9. G.Wang, Q.Liu, and J.Wu,” Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,” in Proc.ACM Conf. Computer and Communication security(ACM CCS), Chicago.IL,2010.
  10. M.Cahse,” Multi-authority attribute based encryption,” inProc.TCC’07, 2007,pp.515-534, Springer.
  11. Yongdong Wu, Zhuo Wei, and Robert H.Deng,”Attribute- Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks,” IEEE TRANSACTION ON MULTIMEDIA,Vol.15, No.4, June 2013.
  12. Kan Yang, Xiaohua Jia, KuiRen,Bo Zhang,and Ruitao Xie,”DAC-MACS:Effective Data Access Control for Multiauthority Cloud Storage Systems,” IEEE Transaction on Information Forensics and Security, Vol.8,No.11,Nov 2013 .
  13. M.Green, S.Hohenberger, and B.Waters,”Outsourcing the decryption of ABE ciphertexts,” in proc.USENIX Security Symp., San Francisco, CA,USA,2011.
  14. M.Green, S.Hohenberger, and B.Waters,”Outsourcing the decryption of ABE ciphertexts,” in proc.USENIX Security Symp., San Francisco, CA,USA,2011.
  15. Rafail Ostrovsky, Amit Sahai, Brent Waters: Attribute- based encryption with non-monotonic access structures. ACM Conference on Computer and Communications Security 2007: 195-203.
  16. Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon, Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage, Computers & Electrical Engineering, Volume 39, Issue 1, January 2013, Pages 34-46, ISSN 0045-7906.
  17. Shuaishuai Zhu; Xiaoyuan Yang; Xuguang Wu, "Secure Cloud File System with Attribute Based Encryption," Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on , vol., no., pp.99,102, 9-11 Sept. 2013.
  18. Zhou Wei; Pierre, G.; Chi-Hung Chi, "CloudTPS: Scalable Transactions for Web Applications in the Cloud," Services Computing, IEEE Transactions on , vol.5, no.4, pp.525,539, Fourth Quarter 2012.
  19. Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters: Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. IACR Cryptology ePrint Archive 2006: 309 (2006).
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Security multiuser access Ciphertext Policy Attribute based encryption (CP-ABE) Cloudsim cloud computing data sharing