Flexible and Fine Grained Secure Data Storage in Cloud Computing

International Journal of Computer Science and Engineering
© 2017 by SSRG - IJCSE Journal
Volume 4 Issue 11
Year of Publication : 2017
Authors : Sana mokhashi, Rashmi Rachh

pdf
How to Cite?

Sana mokhashi, Rashmi Rachh, "Flexible and Fine Grained Secure Data Storage in Cloud Computing," SSRG International Journal of Computer Science and Engineering , vol. 4,  no. 11, pp. 1-3, 2017. Crossref, https://doi.org/10.14445/23488387/IJCSE-V4I11P101

Abstract:

Cloud computing is attaining esteem because of the services it offers, although security is yet an issue to be addressed. The data have to be stored securely on top of cloud to keep away as of the security breaches such as data leaks. To guarantee the security as well as achieve flexibly fine-grained file access control, attribute based encryption (ABE) was proposed as well as used in cloud storage system. This project aims to implement cipher text attribute based encryption scheme in which users with matching attributes with the access policy defined by the data owner are able to decrypt the data.

Keywords:

cloud computing; attribute based encryption (ABE).

References:

[1] A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,”EUROCRYPT’05, LNCS, vol. 3494, pp. 457-473, 2005.
[2] J.Bethencourt, A. Sahai and B. Waters, “Cipher text- Policy Attribute –Based Encryption, ”Proc. IEEE Symposium on Security and Privacy, pp.321-334, May 2007, doi:10.1109/SP.2007.11.
[3] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,”Proc.13th ACM Conference on Computer and Communications Security (CCS ’06), pp. 89-98, 2006, doi:10.1145/1180405.1180418.
[4] D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” SIAM Journal of Computing, vol. 32, no. 3,pp. 586-615,2003.
[5] A. Boldyreva, V. Goyal, and V. Kumar, “Identity- Based Encryption with Efficient Revocation,”Proc.15th ACM conference on Computer and communications security(CCS ’ 08),pp. 417-426,2008.
[6] Rahila Fatima, Dr. S. S. Lomte, Saad Siddiqui “Attribute - Based Data Sharing” International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 10, October 2015.
[7] V. Monishaa, N.R. Rejin Paul” An Efficient Re- encryption Scheme for Secure and Scalable Data Storage in Cloud” International Journal of Computer Science and Engineering Communications Vol.3, Issue 3, 2015, Page.1069-1075.
[8] P.K. Tysowski and M. A. Hasan, “Hybrid Attribute- Based Encryption and Re-Encryption for Scalable Mobile Applications in Clouds,” IEEE Transactions on Cloud Computing, pp. 172-186, 2013.
[9] Junbeom Hur and Dong Kun Noh”Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 7, JULY 2011.
[10] Jiguo Li, Wei Yao, Yichen Zhang, Huiling Qian and Jinguang Han ”Flexible and fine gained data storage in cloud computing ” IEEE TRANSACTIONS ON JOURNAL NAME, MANUSCRIPT ID.
[11] M. Green, S. Hohenbergerand B. Waters, “Outsourcing the decryption of ABE ciphertexts,”Proc.20th USENIX Conference on Security (SEC ’11), pp. 34, 2011.
[12] J. Li, X.F. Chen, J.W. Li, C.F. Jia, J.F. Maand W.J. Lou, “Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryp-tion,”Proc.18th European Symposium on Research in Computer Security(ESORICS ’13),LNCS8134,Berlin: Springer- Verlag, pp. 592-609, 2013.
[13] J.W. Li, C.F. Jia, J. Liand X.F. Chen, “Outsourcing Encryption of At-tribute-Based Encryption with Mapreduce,”Proc.14th International Conference on Information and Communications Security (ICICS ’12), LNCS7618, Berlin: Springer-Verlag, pp. 191-201, 2012.doi:10.1007/978-3-642-34129-8_17.
[14] Dr. M.Newlin Rajkumar, Ancy George, Brighty Batley”An Overview of Multi-Authority Attribute Based Encryption Techniques “International Journal of Advanced Research in Computer and Communication EngineeringVol. 3, Issue 9, September 2014.
[15] Girija Patil” Privacy-Preserving Decentralized Key Policy Attribute-Based Encryption” Girija Patil / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6), 2014, 8225-8228.
[16] J.G. Han, W. Susilo, Y. Mu and J. Yan, “Privacy- Preserving Decentralized Key-Policy Attribute-Based Encryption, ”IEEE Transactions on Parallel and Distributed Systems,vol.23, no.11, pp. 2150-2162, Nov 2012, doi: 10.1109/TPDS.2012.50.
[17] Hiroaki Anada, Seiko Arita” Short CCA-Secure Cipher text-Policy Attribute-Based Encryption” 978-1- 5090-6517-2/17/$31.00 ©2017 IEEE.