Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Hybrid Approach for Cloud Storage with Attribute based Encryption

by Shivam Patole, Anwar Sarkeja
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 154 - Number 1
Year of Publication: 2016
Authors: Shivam Patole, Anwar Sarkeja
10.5120/ijca2016912017

Shivam Patole, Anwar Sarkeja . Hybrid Approach for Cloud Storage with Attribute based Encryption. International Journal of Computer Applications. 154, 1 ( Nov 2016), 12-15. DOI=10.5120/ijca2016912017

@article{ 10.5120/ijca2016912017,
author = { Shivam Patole, Anwar Sarkeja },
title = { Hybrid Approach for Cloud Storage with Attribute based Encryption },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 154 },
number = { 1 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume154/number1/26454-2016912017/ },
doi = { 10.5120/ijca2016912017 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:59:02.839268+05:30
%A Shivam Patole
%A Anwar Sarkeja
%T Hybrid Approach for Cloud Storage with Attribute based Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 154
%N 1
%P 12-15
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In cloud computing there is problem associated with whole life of cloud data. For storage three important aspects of data is Data confidentiality, Data integrity and availability. Data encryption is used for confidentiality. Now, after this encryption data is sent to storage. Now, after the user supplies its key than the data is opened. Thus to provide user based security control for cloud provider is the primary objective of this effort and can be achieved by Homomorphic encryption. Key management is another problem because the user is not expert to manage keys. The user has faced such problems. To develop a security architecture and implement client based confidentiality tool for storage in cloud computing and evaluate traditional security solutions and identify their remaining issues by which overall performance gets degraded. We will implement homomorphic encryption using improved KP-ABE system to achieve data confidentiality.

References
  1. Shucheng Yu , “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing”, in Proceedings of IEEE Infocomm, ISSN: 978-1-4244-5837-0/10, 2010.
  2. Srijith “Towards Secure Cloud Bursting,Brokerage and Aggregation” 2010 Eighth IEEE European conference on web services
  3. Cong Wang, Student Member, IEEE, Sherman S.-M. Chow, Qian Wang, Student Member, IEEE,KuiRen, Member, IEEE, and Wenjing Lou, Member, IEEE “Privacy-Preserving Public Auditing for Secure Cloud Storage, IEEE-2012
  4. Cong Wang1, Qian Wang1, Kui Ren1, and Wenjing Lou2,” Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, IEEE INFOCOM 2010, San Diego, CA, March 2010
  5. Ms. Vaishnavi Moorthy1, Dr. S. Sivasubramaniam2,” Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing, IOSR Journal of EngineeringMar. 2012, Vol. 2(3) pp: 496-500
  6. C. Hota, S. Sanka, M. Rajarajan, S. Nair, "Capability-based Cryptographic Data Access Control in Cloud Computing", in International Journal of Advanced Networking and Applications, Volume 01, Issue 01, 2011.
  7. Rosario Gennaro and Daniel Wichs, Fully Homomorphic Message Authenticators IBM Research, T.J. Watson, May 23, 2012
  8. K. Kajendran, J. Jeyaseelan, J. Joshi, “An Approach for secures Data storage using Cloud Computing” In International Journal of Computer Trends and Technology- May to June Issue 2011
  9. W. Luo, G. Bai, “Ensuring the Data Integrity In Cloud computing” In Proceedings of IEEE CCIS, 2011.
  10. S. Sanka, C. Hota, and M. Rajarajan, “Secure data access in cloud computing,” in 2010 IEEE 4th International http://en.wikipedia.org/wiki
  11. H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp. 90–107.
  12. Dianli GUO and Fengtong WEN, “A More Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment”, in Journal of Computational Information Systems, ISSN; 1553–9105, Vol. 9:No. 2, 2013, 407-413
  13. Kristin Lauter, Michael Naehrig andVinod Vaikuntanathan, “Can Homomorphic Encryption be Practical”, in ACM, 2008.
  14. Craig Gentry, “Computing Arbitrary Functions of Encrypted Data”, in ACM by IBM T.J. Watson Research Center, 2008.
  15. Bharath K. Samanthula, Gerry Howser, Yousef Elmehdwi, and Sanjay Madria, “An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud”, in Cloud 1st conference by ACM, ISSN: 978-1-4503, DOI: 1596-8/12/08, 2012.
  16. Robert Griffin and Subhash Sankuratripati, “Key Management Interoperability Protocol Profile Version 1.1”, in OASIS Standards Organizations at http://docs.oasis-open.org/kmip/profiles/v1.1/os/kmip-profiles-v1.1-os.doc, 2013.
  17. Web Article, “Amazon Web Services: Overview of Security Processes” by Amazon Services at http://aws.amazon.com/security,June 2013.
  18. K. Raen, C. Wang, Q. Wang, “Security Challenges for the Public Cloud”, Published by IEEE Computer Society, Jan/Feb 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Cloud Security Data privacy ABE KP-ABE Cloud Storage