CFP last date
20 May 2024
Reseach Article

Secure Data Storage in Cloud by Decentralized Access Control

by Pooja N. Narve, B.M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 140 - Number 11
Year of Publication: 2016
Authors: Pooja N. Narve, B.M. Patil
10.5120/ijca2016909528

Pooja N. Narve, B.M. Patil . Secure Data Storage in Cloud by Decentralized Access Control. International Journal of Computer Applications. 140, 11 ( April 2016), 37-42. DOI=10.5120/ijca2016909528

@article{ 10.5120/ijca2016909528,
author = { Pooja N. Narve, B.M. Patil },
title = { Secure Data Storage in Cloud by Decentralized Access Control },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 140 },
number = { 11 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume140/number11/24642-2016909528/ },
doi = { 10.5120/ijca2016909528 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:42:02.816977+05:30
%A Pooja N. Narve
%A B.M. Patil
%T Secure Data Storage in Cloud by Decentralized Access Control
%J International Journal of Computer Applications
%@ 0975-8887
%V 140
%N 11
%P 37-42
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is recently developed new emerging technology for complex systems with massive-scale services sharing among numerous users, where user can rent the storage and computing resources of server provided by a company. Users only require a terminal, a smart phone or tablet connected to the internet. Cloud can store huge amount of data, so the mobile users do not have to carry their data. Therefore, security of data, privacy of user and authentication of both users and services is a significant issue for the trust and security of cloud computing. In order to achieve safe storage, we proposed a secure cloud storage scheme providing access to the data using RSA public- key encryption algorithm and digital signature scheme. In this scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. Access control feature is also added by which only a valid users are able to decrypt the stored information. This scheme also prevents replay attack and supports creation, modification, and reading data stored in cloud. Time based user Revocation scheme is also used. Also we compared performance of our system with the 3DES system on the basis of encryption and decryption of data.

References
  1. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” Proc. Ann. Int’l Conf. Advances in Cryptology (EUROCRYPT), pp. 457-473, 2005.
  2. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. ACM Conf. Computer and Comm. Security, pp. 89- 98, 2006.
  3. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy, pp. 321-334, 2007.
  4. M. Chase, “Multi-Authority Attribute Based Encryption,” Proc. Fourth Conf. Theory of Cryptography (TCC), pp. 515-534, 2007.
  5. A.B. Lewko and B. Waters, “Decentralizing Attribute-Based Encryption,” Proc. Ann. Int’l Conf. Advances in Cryptology (EUROCRYPT), pp. 568-588, 2011.
  6. Ch. M Siva Rama Krishna and G. John Samuel, “Decentralized access control with Anonymous authentication of data stored in cloud,”IJMETMR, vol.2,issue no. 8, pp. 2052-2060, 2015.
  7. M. Green, S. Hohenberger, and B. Waters, “Outsourcing the Decryption of ABECiphertexts,” Proc. USENIX Security Symp., 2011.
  8. H.K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion- Resistance,” IACR Cryptology ePrint Archive, 2008.
  9. H.K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-Based Signatures,” Topics in Cryptology - CT-RSA, vol. 6558, pp. 376- 392, 2011.
  10. S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed Access Control in Clouds,” Proc. IEEE 10th Int’l Conf. Trust, Security and Privacy in Computing and Communications (TrustCom), 2011.
  11. L. Ertaul, S. Singhal and G. Saldamli, “Security challenges in cloud computing,” Peter Mell, Tim Grance, The NIST Definition of Cloud Computing, Version 15, October 7, 2009.
  12. J. S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds,” Proc. IEEE/ACM Int’l Symp. Cluster, Cloud and Grid Computing, pp. 556-563, 2012.
  13. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.- June 2012.
  14. S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based Data Sharing with Attribute Revocation,” Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 261-270, 2010.
  15. G. Wang, Q. Liu, and J. Wu, “Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services,” Proc.17th ACM Conf. Computer and Comm. Security (CCS), pp. 735-737, 2010.
  16. F. Zhao, T. Nishide, and K. Sakurai, “Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute- Based Cryptosystems,” Proc. Seventh Int’l Conf. Information Security Practice and Experience (ISPEC), pp. 83-97, 2011.
  17. Sushmita Ruj, Member, Ieee, Milos Stojmenovic, Member, Ieee, And Amiya Nayak,” Decentralized Access Control With Anonymous Authentication Of Data Stored In Clouds” Ieee Transactions On Parallel And Distributed Systems, Vol. 25, No. 2, February 2014.
  18. S. Jahid, P. Mittal, and N. Borisov, “EASiER: Encryption-Based Access Control in Social Networks with Efficient Revocation,”Proc. ACM Symp. Information, Computer and Comm. Security.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Access control User revocation.