CFP last date
20 May 2024
Reseach Article

Two Layer Encryption for Preserving Privacy on Public Cloud

Published on May 2016 by Mayur Parma, Saurabh Deshmukh
National Conference on Advancements in Computer & Information Technology
Foundation of Computer Science USA
NCACIT2016 - Number 2
May 2016
Authors: Mayur Parma, Saurabh Deshmukh
615e867b-ba41-486c-aba4-53669eab1a80

Mayur Parma, Saurabh Deshmukh . Two Layer Encryption for Preserving Privacy on Public Cloud. National Conference on Advancements in Computer & Information Technology. NCACIT2016, 2 (May 2016), 16-19.

@article{
author = { Mayur Parma, Saurabh Deshmukh },
title = { Two Layer Encryption for Preserving Privacy on Public Cloud },
journal = { National Conference on Advancements in Computer & Information Technology },
issue_date = { May 2016 },
volume = { NCACIT2016 },
number = { 2 },
month = { May },
year = { 2016 },
issn = 0975-8887,
pages = { 16-19 },
numpages = 4,
url = { /proceedings/ncacit2016/number2/24706-3042/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advancements in Computer & Information Technology
%A Mayur Parma
%A Saurabh Deshmukh
%T Two Layer Encryption for Preserving Privacy on Public Cloud
%J National Conference on Advancements in Computer & Information Technology
%@ 0975-8887
%V NCACIT2016
%N 2
%P 16-19
%D 2016
%I International Journal of Computer Applications
Abstract

To preserve privacy and secure access control in Public cloud use of two layer encryption algorithms provides better result, but use of the secure hypertext transfer protocol and single sign on approach will increase the efficiency regarding security. It will help owner to improve communication and computation cost as the fine grain access control performed on cloud side and improves security. As an old approach has all the responsibilities of data owner to encrypt data and re-encrypt updated or modified data it incur a high computation cost. As Public cloud is third party so data owner are not able to trust on cloud for security purpose so fine grain access cannot get delegate to cloud side. To overcome this problem and increase security use of two layer encryption algorithms and secure Sockets Layer (SSL) along with Single sign on approach will provide better results.

References
  1. M. Nabeel and E. Bertino, "Privacy Preserving Delegated Access Control in the Storage as a Service Model," Proc. IEEE Int'l Conf. Information Reuse and Integration (IRI), 2012.
  2. N. Shang, M. Nabeel, F. Paci, and E. Bertino, "A Privacy-Preserving Approach to Policy-Based Content Dissemination," Proc. IEEE 26th Int'l Conf. Data Eng. (ICDE '10), 2010.
  3. M. Nabeel, N. Shang, and E. Bertino, "Privacy Preserving Policy Based Content Sharing in Public Clouds," IEEE Trans. Knowledge and Data Eng. , vol. 25, no. 11, pp. 2602-2614, Nov. 2013
  4. M. Nabeel and E. Bertino, "Towards Attribute Based Group Key Management," Proc. 18th ACM Conf. Computer and Comm. Security, 2011.
  5. J. Li and N. Li, "OACerts: Oblivious Attribute Certificates," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 340-352, Oct. -Dec. 2006
  6. M. Nabeel and E. Bertino, "Attribute Based Group Key Management,"to appear in Trans. Data Privacy, 2014.
  7. A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, pp. 612-613, Nov. 1979.
  8. Mohamed Nabeel and Elisa Bertino, Fellow, IEEE "Privacy Preserving Delegated Access Control in Public Clouds", IEEE Transactions on Knowledge and Data Engineering, Vol. 26, No. 9, September 2014.
  9. S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over -encryption: Management of access control evolution on outsourced data," in Proceedings of the33rd International Conference on Very Large Data Bases , VLDB Endowment, pp. 123–134,2007
  10. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute -based encryption for fine-grained access control of encrypted data,"Proceedings of the 13th ACM conference on Computerand communications security. New York, NY, USA: ACM, pp. 89–98, 2006.
  11. A . Reddy, GudivadaLokesh and N. Vikram "Privacy Preserving Delegated Access Control in Public.
Index Terms

Computer Science
Information Sciences

Keywords

Identity Privacy Ssl Policy Decomposition Encryption Cloud Computing Access Control blowfish.