Call for Paper - May 2019 Edition
IJCA solicits original research papers for the May 2019 Edition. Last date of manuscript submission is April 20, 2019. Read More

An Efficient File Hierarchy Attribute-Based Encryption Scheme using Bit Exchanging Method in Cloud Computing

Print
PDF
IJCA Proceedings on International Conference on Communication, Computing and Information Technology
© 2018 by IJCA Journal
ICCCMIT 2017 - Number 1
Year of Publication: 2018
Authors:
Preethi M.
Shri Soundarya C. V.

Preethi M. and Shri Soundarya C V.. Article: An Efficient File Hierarchy Attribute-Based Encryption Scheme using Bit Exchanging Method in Cloud Computing. IJCA Proceedings on International Conference on Communication, Computing and Information Technology ICCCMIT 2017(1):20-24, June 2018. Full text available. BibTeX

@article{key:article,
	author = {Preethi M. and Shri Soundarya C. V.},
	title = {Article: An Efficient File Hierarchy Attribute-Based Encryption Scheme using Bit Exchanging Method in Cloud Computing},
	journal = {IJCA Proceedings on International Conference on Communication, Computing and Information Technology},
	year = {2018},
	volume = {ICCCMIT 2017},
	number = {1},
	pages = {20-24},
	month = {June},
	note = {Full text available}
}

Abstract

Cloud computing is one of the emerging technologies where resources are provided on pay as you go basis. It is an efficient solution for the fast storage and retrieval of data. It is more than simple internet. The main concepts of cloud computing are confidentiality, integrity, availability, authenticity and privacy. The main issues to be concerned about the growth of cloud are security and privacy. It is important to preserve the data, as well as, privacy of users. One of the factors to preserve data is access control. Access control provides privileges to users on their data and protects it from unauthorised users. Access control is widely used in the medical field in which the access to patient's record is granted only to the scheduler and the concerned doctor. In simpler words, access control is the prevention of unauthorised use of resource. Confidentiality and efficiency must be maintained when access control is given for the system resources. So a number of algorithms are introduced and are implemented in the access control methods. This paper deals with one of the access control mechanisms and the algorithm implemented in it.

References

  • Siani Pearson, Taking Account of Privacy when Designing Cloud Computing Services,External Posting Date: March 6, 2009 [Fulltext] Approved for External Publication Internal Posting Date: March 6, 2009 [Fulltext]
  • S. Rajarajeswari1 and K. Somasundaram2, Data Confidentiality and Privacy in Cloud Computing,Indian Journal of Science and Technology, Vol 9(4), DOI: 10. 17485/ijst/2016/v9i4/87040, January 2016,ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645
  • J. M. Suri and B. K. Nath,Security and Privacy in Cloud Computing
  • Tim Mather, SubraKumaraswamy, and ShahedLatif ,Cloud security and privacy
  • NirKshetri,Privacy and security issues in Cloud Computing,PTC'11 Proceedings
  • Privacy in Cloud Computing -ITU-T Technology Watch Report March 2012
  • Yunchuan Sun, Junsheng Zhang, YongoingXiong, GuangyuZhu ,Data Security and Privacy
  • S. Aparna, Devi Dath,Preserving privacy of public clouds through access control mechanisms
  • Abdul Raoufkhan,Access control in cloud computing environment , VOL. 7, NO. 5, MAY 2012 ISSN1819-6608 ARPN Journal of Engineering and Applied Sciences
  • J. Han, W. Susilo, Y. Mu and J. Yan, "Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption," in Proc. ,IEEE Transactions on Parallel and Distributed Systems, 2012
  • JebaPriya, Punithasurya, Analysis of different access control mechanism in cloud,International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 4– No. 2, September 2012 – www. ijais. org
  • NatarajanMeganathan,Review of access control models for cloud computing
  • S. Yamada, N. Attrapadung and B. Santoso, "Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication," in Proc. PKC, pp. 243-261, Springer-Verlag Berlin, Heidelberg, 2012.
  • BokefodeJayant. D ,ApteSulabha S, ModaniDattatray G, Ubaleswapnaja An Analysis of DAC MAC RBAC Access Control based Models for Security,International Journal of Computer Applications (0975 – 8887) Volume 104 – No. 5, October 2014
  • MadhuraMulimani, RashmiRachh, Analysis of Access Control Methods in Cloud Computing, Posted: 8 July 2016 doi:10. 20944/preprints201607. 0012. v1
  • Ryan Ausanka-Crues,Methods for Access Control: Advances and Limitations
  • ErlandJonsson ,ComputerSecurity,Department of Computer Science and Engineering Chalmers University of Technology Sweden
  • Sadeghi,cubaleska,Operating system security,, Cubaleska @RUB, 2008 – 2009
  • Computer Security ,CIS/CSE 643: (Syracuse University)
  • Information systems control and Audit-Institute of CA in India- ISBN:978-81-8441-077-8,The Publication department on behalf of the institute of chartered accountants of India,ICAIBhawan
  • Darwin v tomy, Dhanalakshmi. S, Dr. S. Karthik,Implementing HASBE Scheme for setting up access controls in out-sourced data Clouds ,ISSN: 2278 – 7798 International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 4, April 2013
  • Shuriya. bPhd Scholar, Department of Computer Science and Engineering, RVS Technical campus Coimbatore,Role based Access Control using Cp-Abe Algorithm ,Volume : 4 | Issue : 7 | July 2014 | ISSN - 2249-555X
  • Venkateshprasad. Kalluri1, D. Haritha2 ,CIPHER-Text Policy Attribute Based Access to Cloud,ISSN :0975-9646, Venkateshprasad. Kalluri et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 2796-2799
  • Vijaya Lakshmi Paruchuri1, N Lakshmipathi Anantha2, Vara Lakshmi Konagala1 and Debnath Bhattacharyya3,Ciphertext-Policy Attribute-Based Encryption for Access Control of Data in Cloud ,International Journal of Software Engineering and Its Applications Vol. 10, No. 8 (2016), pp. 13-22 http://dx. doi. org/10. 14257/ijseia. 2016. 10. 8. 02
  • Yan Zhu, Di Ma, Chang Jun Hu, DijiangHuang. How to Use Attribute-Based Encryption to Implement Role-based Access Control in the Cloud
  • BalamuruganB,Extensive Survey on Usage of Attribute Based Encryption in Cloud, Journal of Emerging Technologies in Web Intelligence, vol. 6, no. 3, august 2014
  • XinfengYe,Privacy preserving and delegated access control for cloud applications
  • J. Lai, R. H. Deng, C. Guan and J. Weng, "Attribute-Based Encryption with Verifiable Outsourced Decryption," in Proc. IEEE Transactions on information forensics and security, vol. 8, NO. 8, pp. 1343-1354, 2013.