Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

A Secure Data Storage over Cloud using ABE (Attribute based Encryption) Approach

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Avinash Shukla, Sanjay Silakari, Uday Chourasia
10.5120/ijca2017914509

Avinash Shukla, Sanjay Silakari and Uday Chourasia. A Secure Data Storage over Cloud using ABE (Attribute based Encryption) Approach. International Journal of Computer Applications 168(9):45-48, June 2017. BibTeX

@article{10.5120/ijca2017914509,
	author = {Avinash Shukla and Sanjay Silakari and Uday Chourasia},
	title = {A Secure Data Storage over Cloud using ABE (Attribute based Encryption) Approach},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {168},
	number = {9},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {45-48},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume168/number9/27905-2017914509},
	doi = {10.5120/ijca2017914509},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Cloud computing technology, its component and various storage strategies is emerging today. All Industries are moving towards cloud due to its fast and scalable in nature. Further a data sharing is possible in between the organization or in group of people. There is technique which uses encryption technique, data access control or verification of users data. Cloud computing technique emerges in its own technique to provide best effort and reliability to the user. Existing approaches used different key generation model for data storage. In this paper an enhance session creation technique is used which is providing the security assurance to the user. The experiment performed with both existing and proposed approach over user data upload. It is further observed that the proposed work outperform data access with less computation time and cost. It can further be used for real-time application without security compromise , as well as in mobile computing.

References

  1. Tiantian LIU, Tongkai JI, Qiang YUE, Zhenchu TANG “G-Cloud: A Highly Reliable and Secure IaaS Platform” IEEE, 2015.
  2. Kadam Prasad,Jadhav Poonam,Khupase Gauri, N. C. Thoutam “Data Sharing Security and Privacy Preservation in Cloud Computing” IEEE, 2015.
  3. N. Shanmugakani, R. Chinna “An Explicit Integrity Verification Scheme for cloud Distributed systems” ICSO, IEEE, 2015.
  4. Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol “an Efficient Id based Message Recoverable Privacy Preserving Auditing schme” PST, IEEE 2015.
  5. Nivedita Simbre, Priya Deshpandey “Enhancing Distributed Data Storage security for cloud computing using TPA and AES algorithm” IEEE, 2015.
  6. Naithik Shah, NisargDesai,ViralVashi,” Efficient Cryptography for Data Security”,2014 International Conference on Computing for Sustainable Global Development (INDIACom).
  7. M. Yamuna, S. Ravi Rohith, Pramodh Mazumdar, Avani Gupta ”Text Encryption Using Matrices ”, International Journal of Application or Innovation in Engineering & Management (IJAIEM)Volume 2, Issue 3, March 2013.
  8. Devendra Prasad,Govind Prasad Arya, Chirag Chaudhary, Vipin Kumar, “A Text Encryption and Decryption Technique Using Substitution-Transposition and Basic Arithmetic and Logic Operation ”,International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014.
  9. Udepal Singh, UpasnaGarg,” An ASCII value based text data encryption System”, International Journal of Scientific and Research Publications, Volume 3, Issue 11, November 2013 1 ISSN 2250-3153.
  10. Charru, Paramjeet Singh, Shaveta Rani “Efficient Text Data Encryption System to Optimize Execution Time and Data Security”International Journal of Advanced Research in Computer Science and Software Engineering(IJARCSSE), Volume4,Issue7,July2014.
  11. J. Gitanjali, Dr. N. Jeyanthi, C. Ranichandra, M. Pounambal, “ASCII Based Cryptography Using Unique ID, Matrix Multiplication and Palindrome Number”, The International symposium on Networks, Computers and Communications, IEEE, 2014.
  12. Cloud Security Alliance. (2009) Security guidance for critical areas of focus in cloud computing V2.1. http://www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf
  13. M. Jensen. et. al. (2009) “On Technical Security Issues in Cloud Computing” IEEE International Conference in Cloud Conouting, pp.109-116, Sep 2009.
  14. M. McIntosh and P. Austel. “XML Signature Element Wrapping Attack and CounterMeasures” Workshop on Secure Web Service, pp.20-27, 2005.
  15. S. Subashini, ,Kavitha,V."A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. In Press, Corrected Proof.

Keywords

Cloud security, data encryption,auditing approach, virtualization, and data access.