CFP last date
20 June 2024
Reseach Article

An Efficient File Hierarchy Attribute-Based Encryption Scheme using Bit Exchanging Method in Cloud Computing

Published on June 2018 by Preethi M., Shri Soundarya C. V.
International Conference on Communication, Computing and Information Technology
Foundation of Computer Science USA
ICCCMIT2017 - Number 1
June 2018
Authors: Preethi M., Shri Soundarya C. V.
ddbd199c-6b06-4132-9f37-01801604f824

Preethi M., Shri Soundarya C. V. . An Efficient File Hierarchy Attribute-Based Encryption Scheme using Bit Exchanging Method in Cloud Computing. International Conference on Communication, Computing and Information Technology. ICCCMIT2017, 1 (June 2018), 20-24.

@article{
author = { Preethi M., Shri Soundarya C. V. },
title = { An Efficient File Hierarchy Attribute-Based Encryption Scheme using Bit Exchanging Method in Cloud Computing },
journal = { International Conference on Communication, Computing and Information Technology },
issue_date = { June 2018 },
volume = { ICCCMIT2017 },
number = { 1 },
month = { June },
year = { 2018 },
issn = 0975-8887,
pages = { 20-24 },
numpages = 5,
url = { /proceedings/icccmit2017/number1/29479-1721/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Communication, Computing and Information Technology
%A Preethi M.
%A Shri Soundarya C. V.
%T An Efficient File Hierarchy Attribute-Based Encryption Scheme using Bit Exchanging Method in Cloud Computing
%J International Conference on Communication, Computing and Information Technology
%@ 0975-8887
%V ICCCMIT2017
%N 1
%P 20-24
%D 2018
%I International Journal of Computer Applications
Abstract

Cloud computing is one of the emerging technologies where resources are provided on pay as you go basis. It is an efficient solution for the fast storage and retrieval of data. It is more than simple internet. The main concepts of cloud computing are confidentiality, integrity, availability, authenticity and privacy. The main issues to be concerned about the growth of cloud are security and privacy. It is important to preserve the data, as well as, privacy of users. One of the factors to preserve data is access control. Access control provides privileges to users on their data and protects it from unauthorised users. Access control is widely used in the medical field in which the access to patient's record is granted only to the scheduler and the concerned doctor. In simpler words, access control is the prevention of unauthorised use of resource. Confidentiality and efficiency must be maintained when access control is given for the system resources. So a number of algorithms are introduced and are implemented in the access control methods. This paper deals with one of the access control mechanisms and the algorithm implemented in it.

References
  1. Siani Pearson, Taking Account of Privacy when Designing Cloud Computing Services,External Posting Date: March 6, 2009 [Fulltext] Approved for External Publication Internal Posting Date: March 6, 2009 [Fulltext]
  2. S. Rajarajeswari1 and K. Somasundaram2, Data Confidentiality and Privacy in Cloud Computing,Indian Journal of Science and Technology, Vol 9(4), DOI: 10. 17485/ijst/2016/v9i4/87040, January 2016,ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645
  3. J. M. Suri and B. K. Nath,Security and Privacy in Cloud Computing
  4. Tim Mather, SubraKumaraswamy, and ShahedLatif ,Cloud security and privacy
  5. NirKshetri,Privacy and security issues in Cloud Computing,PTC'11 Proceedings
  6. Privacy in Cloud Computing -ITU-T Technology Watch Report March 2012
  7. Yunchuan Sun, Junsheng Zhang, YongoingXiong, GuangyuZhu ,Data Security and Privacy
  8. S. Aparna, Devi Dath,Preserving privacy of public clouds through access control mechanisms
  9. Abdul Raoufkhan,Access control in cloud computing environment , VOL. 7, NO. 5, MAY 2012 ISSN1819-6608 ARPN Journal of Engineering and Applied Sciences
  10. J. Han, W. Susilo, Y. Mu and J. Yan, "Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption," in Proc. ,IEEE Transactions on Parallel and Distributed Systems, 2012
  11. JebaPriya, Punithasurya, Analysis of different access control mechanism in cloud,International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 4– No. 2, September 2012 – www. ijais. org
  12. NatarajanMeganathan,Review of access control models for cloud computing
  13. S. Yamada, N. Attrapadung and B. Santoso, "Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication," in Proc. PKC, pp. 243-261, Springer-Verlag Berlin, Heidelberg, 2012.
  14. BokefodeJayant. D ,ApteSulabha S, ModaniDattatray G, Ubaleswapnaja An Analysis of DAC MAC RBAC Access Control based Models for Security,International Journal of Computer Applications (0975 – 8887) Volume 104 – No. 5, October 2014
  15. MadhuraMulimani, RashmiRachh, Analysis of Access Control Methods in Cloud Computing, Posted: 8 July 2016 doi:10. 20944/preprints201607. 0012. v1
  16. Ryan Ausanka-Crues,Methods for Access Control: Advances and Limitations
  17. ErlandJonsson ,ComputerSecurity,Department of Computer Science and Engineering Chalmers University of Technology Sweden
  18. Sadeghi,cubaleska,Operating system security,, Cubaleska @RUB, 2008 – 2009
  19. Computer Security ,CIS/CSE 643: (Syracuse University)
  20. Information systems control and Audit-Institute of CA in India- ISBN:978-81-8441-077-8,The Publication department on behalf of the institute of chartered accountants of India,ICAIBhawan
  21. Darwin v tomy, Dhanalakshmi. S, Dr. S. Karthik,Implementing HASBE Scheme for setting up access controls in out-sourced data Clouds ,ISSN: 2278 – 7798 International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 4, April 2013
  22. Shuriya. bPhd Scholar, Department of Computer Science and Engineering, RVS Technical campus Coimbatore,Role based Access Control using Cp-Abe Algorithm ,Volume : 4 | Issue : 7 | July 2014 | ISSN - 2249-555X
  23. Venkateshprasad. Kalluri1, D. Haritha2 ,CIPHER-Text Policy Attribute Based Access to Cloud,ISSN :0975-9646, Venkateshprasad. Kalluri et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 2796-2799
  24. Vijaya Lakshmi Paruchuri1, N Lakshmipathi Anantha2, Vara Lakshmi Konagala1 and Debnath Bhattacharyya3,Ciphertext-Policy Attribute-Based Encryption for Access Control of Data in Cloud ,International Journal of Software Engineering and Its Applications Vol. 10, No. 8 (2016), pp. 13-22 http://dx. doi. org/10. 14257/ijseia. 2016. 10. 8. 02
  25. Yan Zhu, Di Ma, Chang Jun Hu, DijiangHuang. How to Use Attribute-Based Encryption to Implement Role-based Access Control in the Cloud
  26. BalamuruganB,Extensive Survey on Usage of Attribute Based Encryption in Cloud, Journal of Emerging Technologies in Web Intelligence, vol. 6, no. 3, august 2014
  27. XinfengYe,Privacy preserving and delegated access control for cloud applications
  28. J. Lai, R. H. Deng, C. Guan and J. Weng, "Attribute-Based Encryption with Verifiable Outsourced Decryption," in Proc. IEEE Transactions on information forensics and security, vol. 8, NO. 8, pp. 1343-1354, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Security Privacy Access Control Cp-abe Bit Exchange Method.