An Efficient Multi Authority and Privacy of Data Access Control in the Cloud Storage Systems

International Journal of Computer Science and Engineering
© 2016 by SSRG - IJCSE Journal
Volume 3 Issue 12
Year of Publication : 2016
Authors : Reddi Narendra Kumar, Behara Vineela

pdf
Citation:
MLA Style:

Reddi Narendra Kumar, Behara Vineela, "An Efficient Multi Authority and Privacy of Data Access Control in the Cloud Storage Systems" SSRG International Journal of Computer Science and Engineering 3.12 (2016): 10-13.

APA Style:

Reddi Narendra Kumar, Behara Vineela,(2016). An Efficient Multi Authority and Privacy of Data Access Control in the Cloud Storage Systems. SSRG International Journal of Computer Science and Engineering 3(12), 10-13.

Abstract:

 Cloud Storage is an important service of cloud computing for storing data into cloud and retrieve data from the cloud computing. So that the data owners will allow to stored data into cloud and users to access data from the cloud. Data access control is an effective way to ensure that provide security of stored data in the cloud. However cloud service separates the roles of the data owner from the data service provider and the data owner does not interact with the users directly for providing data access service, which makes the data access control a challenging issue in cloud storage systems. Because the cloud server cannot be fully trusted by data owners, existing server-based access control methods are no longer applicable to cloud storage systems. To prevent the untrusted servers from accessing sensitive data, traditional methods usually encrypt the data and only users holding valid keys can access the data. These methods require complicated key management schemes and the data owners have to stay online all the time to deliver keys to new users in the system. Moreover, these methods incur high storage overhead on the server, because the server should store multiple encrypted copies of the same data for users with different keys. By overcome those problems we can implement the cipher text policy based key generation schema will be used for generation for of the encryption key. After generating key the data owner will encrypt the data using idea algorithm and stored the data into cloud storage. If any user retrieve the file it will authenticated by using one time password authentication schema. After completion of authentication schema each user will retrieve the file and decrypt it. By performing those functionalities we can improve the efficiency of the project and also provide more privacy of stored data into cloud.

References:

[1]. Wei Li, Kaiping Xue, Yingjie Xue, and Jianan Hong, “TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage”, IEEE Transactions on parallel and distributed systems, VOL.24, NO. 06, October 2015.J.
[2]. Kan Yang and Xiaohua Jia, “Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage”, IEEE Transactions on parallel and distributed systems, VOL. 25, NO. 07, July 2014.
[3]. A. Shamir, ―Identity-based cryptosystems and signature schemes, in Proceedings of the 4st Annual International Cryptology Conference: Advances in Cryptology - CRYPTO’84. Springer, (1984), pp. 47–53.
[4] D. Boneh and M. K. Franklin, ―Identity-based encryption from the weil pairing, in Proceedings of the 21st Annual International Cryptology Conference: Advances in Cryptology - CRYPTO’01. Springer, (2001), pp. 213–229.
[5]. V. Goyal, O. Pandey, A. Sahai, and B. Waters, ―Attributebased encryption for fine-grained access control of encrypted data, in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS’06). ACM, (2006), pp. 89– 98.
[6]. A. Sahai and B. Waters, ―Fuzzy identity-based encryption, in Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology - EUROCRYPT’05. Springer, (2005), pp. 457–473.
[7] J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in Security and Privacy, 2007. SP'07. IEEE Symposium on, (2007), pp. 321-334.
[8]. Z. Liu, Z. Cao, and D. S. Wong, "Blackbox traceable CPABE: how to catch people leaking their keys by selling decryption devices on ebay," in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (2013), pp. 475-486.
[9]. K. Yang, X. Jia, and K. Ren, “DAC-MACS: Effective data access control for multi authority cloud storage systems,” IEEE Trans. Information Forensics and Security, vol. 8, no. 11, pp. 1790-1801, Nov. 2013.
[10]. M. Chase and S. S. M. Chow, “Improving privacy and security in multi authority attribute-based encryption,” Proc. CCS’09, pp.121-130, 2009.

Key Words:

Data Access Control, Authentication, Signature, Cryptography, one time password.