SlideShare a Scribd company logo
MigrantSystems
International Journal of Inventions in Computer Science and Engineering
ISSN (Online): 2348 – 3539, ISSN (Print): 2348 – 3431 Volume 1 Issue 2 2014.
__________________________________________________________________________________________
03.2014-12CSE05 www.ijicse.com
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN
CLOUD USING KEY POLICY ATTRIBUTE BASED
ENCRYPTION
1
S.Seenu Iropia, 2
R.Vijayalakshmi
1
PG Scholar Department of Information Technology, SRM University, ssiropia@gmail.com.
2
Assistant Professor Department of Information Technology, SRM University.
ABSTRACT: Cloud computing is a rising computing standard in which assets of the computing
framework are given as a service over the Internet. As guaranteeing as it may be, this standard
additionally delivers a lot of people new challenges for data security and access control when clients
outsource sensitive data for offering on cloud servers, which are not inside the same trusted dominion as
data possessors. In any case, in completing thus, these results unavoidably present a substantial
processing overhead on the data possessor for key distribution and data administration when fine-
grained data access control is in demand, and subsequently don't scale well. The issue of at the same time
accomplishing fine-grainedness, scalability, and data confidentiality of access control really still remains
uncertain. This paper addresses this open issue by, on one hand, characterizing and implementing access
policies based on data qualities, and, then again, permitting the data owner to representative the majority
of the calculation undertakings included in fine-grained data access control to un-trusted cloud servers
without unveiling the underlying data substance. We accomplish this goal by exploiting and combining
techniques of decentralized key policy Attribute Based Encryption (KP-ABE) . Extensive investigation
shows that the proposed approach is highly efficient and secure.
Keywords: Access Control, Cloud Computing, Key Policy Attribute Based Encryption (KP-ABE)
I. INTRODUCTION
Cloud computing is a promising computing model which currently has drawn far reaching consideration
from both the educational community and industry. By joining a set of existing and new procedures from
research areas, for example, Service-Oriented Architectures (SOA) and virtualization, cloud computing is
viewed all things considered a computing model in which assets in the computing infrastructure are given
as services over the Internet. It is a new business solution for remote reinforcement outsourcing, as it
offers a reflection of interminable storage space for customers to have data reinforcements in a pay-as-
you- go way [1]. It helps associations and government offices fundamentally decrease their financial
overhead of data administration, since they can now store their data reinforcements remotely to third-
party cloud storage suppliers as opposed to keep up data centers on their own. Numerous services like
email, Net banking and so forth… are given on the Internet such that customers can utilize them from
anyplace at any time. Indeed cloud storage is more adaptable, how the security and protection are
accessible for the outsourced data turns into a genuine concern. The three points of this issue are
availability, confidentiality and integrity.
To accomplish secure data transaction in cloud, suitable cryptography method is utilized. The data
possessor must encrypt the record and then store the record to the cloud. Assuming that a third person
downloads the record, they may see the record if they had the key which is utilized to decrypt the
encrypted record. Once in a while this may be failure because of the technology improvement and the
programmers. To overcome the issue there is lot of procedures and techniques to make secure transaction
and storage.
MigrantSystems
International Journal of Inventions in Computer Science and Engineering
ISSN (Online): 2348 – 3539, ISSN (Print): 2348 – 3431 Volume 1 Issue 2 2014.
__________________________________________________________________________________________
03.2014-12CSE05 www.ijicse.com
Recently [2] addressed Anonymous authentication for data archiving to clouds. Anonymous
authentication is the procedure of accepting the client without the details of the client. So the cloud server
doesn’t know the details of the client, which gives security to the clients to conceal their details from
other clients of that cloud.
Security and privacy assurance in clouds are analyzed and tested by numerous researchers. [3] gives
storage security utilizing Reed-Solomon eradication correcting codes. Utilizing homomorphic encryption,
[4] the cloud gains cipher text and furnishes an encoded value of the result. The client has the capacity to
translate the result; however the cloud does not comprehend what data it has worked on.
In this paper key policy Attribute Based Encryption scheme is used to control unauthorized access. In
addition revocation scheme is used for time based file assured deletion.
II. RELATED WORK
Access control in clouds is gaining consideration on the grounds that it is imperative that just authorized
clients have access to services. A colossal measure of data is constantly archived in the cloud, and much
of this is sensitive data. Utilizing Attribute Based Encryption (ABE), the records are encrypted under a
few access strategy furthermore saved in the cloud. Clients are given sets of traits and corresponding
keys. Just when the clients have matching set of attributes, would they be able to decrypt the data saved in
the cloud. [5][6] Studied the access control in health care.
Access control is likewise gaining imperativeness in online social networking where users store their
personal data, pictures, films and shares them with selected group of users they belong. Access control in
online social networking has been studied in [7].
The work done by [8] gives privacy preserving authenticated access control in cloud. Nonetheless, the
researchers take a centralized methodology where a single key distribution center (KDC) disperses secret
keys and attributes to all clients. Unfortunately, a single KDC is not just a single point of failure however
troublesome to uphold due to the vast number of clients that are upheld in a nature's domain. The scheme
In [9] uses a symmetric key approach and does not support authentication.
Multi-authority ABE principle was concentrated on in [10], which obliged no trusted power which
requires each client to have characteristics from at all the KDCs.
In spite of the fact that Yang et al. [11] proposed a decentralized approach, their strategy does not confirm
clients, who need to remain anonymous while accessing the cloud. Ruj et al. [12] proposed a distributed
access control module in clouds. On the other hand, the approach did not provide client verification. The
other weakness was that a client can make and store an record and different clients can just read the
record. write access was not allowed to clients other than the originator.
Time-based file assured deletion, which is initially presented in [13], implies that records could be safely
erased and remain forever difficult to reach after a predefined time. The primary thought is that a record is
encrypted with an information key by the possessor of the record, and this information key is further
encrypted with a control key by a separate key Manager.
MigrantSystems
International Journal of Inventions in Computer Science and Engineering
ISSN (Online): 2348 – 3539, ISSN (Print): 2348 – 3431 Volume 1 Issue 2 2014.
__________________________________________________________________________________________
03.2014-12CSE05 www.ijicse.com
Fig 1 Cloud Architecture
III. PROPOSED METHODOLOGY
A. Distributed Key Policy Attribute Based Encryption
KP-ABE is a public key cryptography primitive for one-to-many correspondences. In KP-ABE,
information is associated with attributes for each of which a public key part is characterized. The
encryptor associates the set of attributes to the message by scrambling it with the comparing public key
parts. Every client is assigned an access structure which is normally characterized as an access tree over
information attributes, i.e., inside hubs of the access tree are limit doors and leaf hubs are connected with
attributes. Client secret key is characterized to reflect the access structure so the client has the ability to
decode a cipher-text if and just if the information attributes fulfill his access structure. The proposed
scheme consists of four algorithms which is defined as follows
Setup:
This algorithm takes as input security parameters and attribute universe of cardinality N. It then defines a
bilinear group of prime number. It returns a public key and the master key which is kept secret by the
authority party.
Encryption:
It takes a message, public key and set of attributes. It outputs a cipher text.
Key Generation:
It takes as input an access tree, master key and public key. It outputs user secret key.
MigrantSystems
International Journal of Inventions in Computer Science and Engineering
ISSN (Online): 2348 – 3539, ISSN (Print): 2348 – 3431 Volume 1 Issue 2 2014.
__________________________________________________________________________________________
03.2014-12CSE05 www.ijicse.com
Decryption:
It takes as input cipher text, user secret key and public key. It first computes a key for each leaf node.
Then it aggregates the results using polynomial interpolation technique and returns the message.
B. File Assured Deletion
The policy of a file may be denied under the request by the customer, when terminating the time of the
agreement or totally move the files starting with one cloud then onto the next cloud nature's domain. The
point when any of the above criteria exists the policy will be repudiated and the key director will totally
evacuates the public key of the associated file. So no one can recover the control key of a repudiated file
in future. For this reason we can say the file is certainly erased.
To recover the file, the user must ask for the key supervisor to produce the public key. For that the user
must be verified. The key policy attribute based encryption standard is utilized for file access which is
verified by means of an attribute connected with the file. With file access control the file downloaded
from the cloud will be in the arrangement of read just or write underpinned. Every client has connected
with approaches for each one file. So the right client will access the right file. For making file access the
key policy attribute based encryption.
IV. CONCLUSION
We have introduced a decentralized access control system with anonymous authentication, which gives
client renouncement also prevents replay attacks. The cloud does not know the identity of the client who
saves data, however just checks the client's certifications. Key dissemination is carried out in a
decentralized manner. One limit is that the cloud knows the access strategy for each one record saved in
the cloud.
REFERENCES
1. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A.
Rabkin, I. Stoica, and M. Zaharia. A View of Cloud Computing. Comm. of the ACM, 53(4):50–
58, Apr 2010.
2. Sushmita Ruj, Milos Stojmenovic and Amiya Nayak,“Decentralized Access Control with
Anonymous Authentication of Data Stored in Clouds”, IEEE TRANSACTIONS ON PARALLEL
AND DISTRIBUTED SYSTEMS.
3. Wang, Q.Wang, K.Ren, N.Cao and W.Lou, “Toward Secure and Dependable Storage Services in
Cloud Computing”, IEEE T.Services Computing, Vol. 5, no.2, pp. 220-232, 2012.
4. C.Gentry, “A fully homomorphic encryption scheme”, Ph.D. dissertation, Stanford University,
2009, http://www.crypto.stanford.edu/craig.
5. personal M. Li, S. Yu, K. Ren, and W. Lou, “Securing health records in cloud computing:
Patient-centric and fine-grained data access control in multi owner settings,” in SecureComm, pp.
89–106, 2010.
6. S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in
ACM ASIACCS, pp. 261–270, 2010.
7. S. Jahid, P. Mittal, and N. Borisov, “EASiER: Encryption-based access control in social networks
with efficient revocation,” in ACM ASIACCS, 2011.
8. F. Zhao, T. Nishide, and K. Sakurai, “Realizing fine-grained and flexible access control to
outsourced data with attribute-based cryptosystems,” in ISPEC, ser. Lecture Notes in Computer
Science, vol. 6672. Springer, pp. 83–97, 2011.
MigrantSystems
International Journal of Inventions in Computer Science and Engineering
ISSN (Online): 2348 – 3539, ISSN (Print): 2348 – 3431 Volume 1 Issue 2 2014.
__________________________________________________________________________________________
03.2014-12CSE05 www.ijicse.com
9. W. Wang, Z. Li, R. Owens, and B. Bhargava, “Secure and efficient access to outsourced data,” in
ACM Cloud Computing Security Workshop (CCSW), 2009.
10. M. Chase and S. S. M. Chow, “Improving privacy and security in multi authority attribute-based
encryption,” in ACM Conference on Computer and Communications Security, pp. 121–130, 2009.
11. Kan Yang, Xiaohua Jia and Kui Ren, “ DAC-MACS: Effective Data Access Control for Multi-
Authority Cloud Storage Systems”, IACR Cryptology ePrint Archive, 419, 2012.
12. S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed access control in clouds,” in IEEE
TrustCom, 2011.
13. . Perlman, “File System Design with Assured Delete,” Proc.Network and Distributed System
Security Symp. ISOC (NDSS), 2007.

More Related Content

What's hot (20)

PDF
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
ijiert bestjournal
 
PPT
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
 
PDF
J018145862
IOSR Journals
 
PDF
Single sign on mechanism for distributed computing
eSAT Publishing House
 
PDF
Cloud Computing Environment using Secured Access Control Technique
IRJET Journal
 
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
PDF
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
Nexgen Technology
 
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
PDF
Attribute-Based Data Sharing
IJERA Editor
 
PDF
Enhanced security framework to ensure data security
eSAT Publishing House
 
PDF
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
PDF
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Editor IJCATR
 
DOCX
pay as you decrypt decryption outsourcing for functional encryption using blo...
Venkat Projects
 
PDF
Attribute based encryption with privacy preserving in clouds
Swathi Rampur
 
PDF
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
PDF
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
Pvrtechnologies Nellore
 
PPTX
Secure data sharing for dynamic groups in multi-owner using cloud
Sagar Dhanake
 
PDF
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal
 
PPTX
Shared aythority ppt design [autosaved]
Raj Kumar
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
ijiert bestjournal
 
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
 
J018145862
IOSR Journals
 
Single sign on mechanism for distributed computing
eSAT Publishing House
 
Cloud Computing Environment using Secured Access Control Technique
IRJET Journal
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
Nexgen Technology
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
Attribute-Based Data Sharing
IJERA Editor
 
Enhanced security framework to ensure data security
eSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Editor IJCATR
 
pay as you decrypt decryption outsourcing for functional encryption using blo...
Venkat Projects
 
Attribute based encryption with privacy preserving in clouds
Swathi Rampur
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Pvrtechnologies Nellore
 
Secure data sharing for dynamic groups in multi-owner using cloud
Sagar Dhanake
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal
 
Shared aythority ppt design [autosaved]
Raj Kumar
 

Viewers also liked (8)

PPT
Decentralized access control with anonymous authentication of data stored in ...
Papitha Velumani
 
PPTX
Decentralized access control with anonymous authentication of data stored in ...
IGEEKS TECHNOLOGIES
 
DOC
Decentralized access control with anonymous authentication of data stored in ...
Adz91 Digital Ads Pvt Ltd
 
PPTX
Decentralized access control with anonymous authentication of data stored in ...
LeMeniz Infotech
 
PPTX
Decentralized access control with authentication anonymous of data stored in ...
Guellord Mpia
 
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
DOCX
Attribute Based Encryption
UT, San Antonio
 
DOCX
Decentralized access control with anonymous authentication of data stored in ...
LeMeniz Infotech
 
Decentralized access control with anonymous authentication of data stored in ...
Papitha Velumani
 
Decentralized access control with anonymous authentication of data stored in ...
IGEEKS TECHNOLOGIES
 
Decentralized access control with anonymous authentication of data stored in ...
Adz91 Digital Ads Pvt Ltd
 
Decentralized access control with anonymous authentication of data stored in ...
LeMeniz Infotech
 
Decentralized access control with authentication anonymous of data stored in ...
Guellord Mpia
 
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
Attribute Based Encryption
UT, San Antonio
 
Decentralized access control with anonymous authentication of data stored in ...
LeMeniz Infotech
 
Ad

Similar to DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBUTE BASED ENCRYPTION (20)

PDF
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
PDF
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
 
PDF
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
PDF
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
IJECEIAES
 
PDF
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
ijsrd.com
 
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
PDF
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
PDF
Volume 2-issue-6-2073-2076
Editor IJARCET
 
PDF
Volume 2-issue-6-2073-2076
Editor IJARCET
 
PDF
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
hemanthbbc
 
PDF
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
ASAITHAMBIRAJAA
 
PDF
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
ASAITHAMBIRAJAA
 
PDF
Analysis of classical encryption techniques in cloud computing
redpel dot com
 
PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
PDF
IJSRED-V2I3P52
IJSRED
 
PDF
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
 
PDF
A Secure & Scalable Access Method in Cloud Computing
ijsrd.com
 
PDF
Enforcing multi user access policies in cloud computing
IAEME Publication
 
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
IJECEIAES
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
ijsrd.com
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attrib...
1crore projects
 
Volume 2-issue-6-2073-2076
Editor IJARCET
 
Volume 2-issue-6-2073-2076
Editor IJARCET
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
ASAITHAMBIRAJAA
 
Analysis of classical encryption techniques in cloud computing
redpel dot com
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
IJSRED-V2I3P52
IJSRED
 
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
 
A Secure & Scalable Access Method in Cloud Computing
ijsrd.com
 
Enforcing multi user access policies in cloud computing
IAEME Publication
 
Ad

More from Migrant Systems (15)

PDF
Secure Mining of Association Rules in Horizontally Distributed Databases
Migrant Systems
 
PDF
m-Privacy for Collaborative Data Publishing
Migrant Systems
 
PDF
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
Migrant Systems
 
PDF
Supporting Privacy Protection in Personalized Web Search
Migrant Systems
 
PPT
Java introduction
Migrant Systems
 
PPTX
Business Intelligence
Migrant Systems
 
PPT
Voyage planet
Migrant Systems
 
PPTX
User friendly pattern search paradigm
Migrant Systems
 
PPT
Cloud Computing in migrant
Migrant Systems
 
PPT
Business intelligent
Migrant Systems
 
DOCX
Enhancing Access Privacy of Range Retrievals over B+Trees
Migrant Systems
 
DOCX
Abstract
Migrant Systems
 
PDF
Enhancing access privacy of range retrievals over b+trees
Migrant Systems
 
PDF
Fingerprint combination for privacy protection
Migrant Systems
 
Secure Mining of Association Rules in Horizontally Distributed Databases
Migrant Systems
 
m-Privacy for Collaborative Data Publishing
Migrant Systems
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
Migrant Systems
 
Supporting Privacy Protection in Personalized Web Search
Migrant Systems
 
Java introduction
Migrant Systems
 
Business Intelligence
Migrant Systems
 
Voyage planet
Migrant Systems
 
User friendly pattern search paradigm
Migrant Systems
 
Cloud Computing in migrant
Migrant Systems
 
Business intelligent
Migrant Systems
 
Enhancing Access Privacy of Range Retrievals over B+Trees
Migrant Systems
 
Enhancing access privacy of range retrievals over b+trees
Migrant Systems
 
Fingerprint combination for privacy protection
Migrant Systems
 

Recently uploaded (20)

PDF
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
PPTX
PPT-Q1-WEEK-3-SCIENCE-ERevised Matatag Grade 3.pptx
reijhongidayawan02
 
PDF
Geographical diversity of India short notes by sandeep swamy
Sandeep Swamy
 
PPTX
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
PDF
Aprendendo Arquitetura Framework Salesforce - Dia 03
Mauricio Alexandre Silva
 
PPTX
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
PDF
Exploring the Different Types of Experimental Research
Thelma Villaflores
 
PPT
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
QUARTER 1 WEEK 2 PLOT, POV AND CONFLICTS
KynaParas
 
PDF
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
PPTX
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
PPTX
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
PDF
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
PPTX
Controller Request and Response in Odoo18
Celine George
 
PPTX
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
PDF
Women's Health: Essential Tips for Every Stage.pdf
Iftikhar Ahmed
 
PDF
The Different Types of Non-Experimental Research
Thelma Villaflores
 
PPTX
PPT-Q1-WK-3-ENGLISH Revised Matatag Grade 3.pptx
reijhongidayawan02
 
PDF
Biological Bilingual Glossary Hindi and English Medium
World of Wisdom
 
PDF
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
PPT-Q1-WEEK-3-SCIENCE-ERevised Matatag Grade 3.pptx
reijhongidayawan02
 
Geographical diversity of India short notes by sandeep swamy
Sandeep Swamy
 
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
Aprendendo Arquitetura Framework Salesforce - Dia 03
Mauricio Alexandre Silva
 
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
Exploring the Different Types of Experimental Research
Thelma Villaflores
 
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
QUARTER 1 WEEK 2 PLOT, POV AND CONFLICTS
KynaParas
 
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
Controller Request and Response in Odoo18
Celine George
 
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
Women's Health: Essential Tips for Every Stage.pdf
Iftikhar Ahmed
 
The Different Types of Non-Experimental Research
Thelma Villaflores
 
PPT-Q1-WK-3-ENGLISH Revised Matatag Grade 3.pptx
reijhongidayawan02
 
Biological Bilingual Glossary Hindi and English Medium
World of Wisdom
 
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 

DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBUTE BASED ENCRYPTION

  • 1. MigrantSystems International Journal of Inventions in Computer Science and Engineering ISSN (Online): 2348 – 3539, ISSN (Print): 2348 – 3431 Volume 1 Issue 2 2014. __________________________________________________________________________________________ 03.2014-12CSE05 www.ijicse.com DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBUTE BASED ENCRYPTION 1 S.Seenu Iropia, 2 R.Vijayalakshmi 1 PG Scholar Department of Information Technology, SRM University, [email protected]. 2 Assistant Professor Department of Information Technology, SRM University. ABSTRACT: Cloud computing is a rising computing standard in which assets of the computing framework are given as a service over the Internet. As guaranteeing as it may be, this standard additionally delivers a lot of people new challenges for data security and access control when clients outsource sensitive data for offering on cloud servers, which are not inside the same trusted dominion as data possessors. In any case, in completing thus, these results unavoidably present a substantial processing overhead on the data possessor for key distribution and data administration when fine- grained data access control is in demand, and subsequently don't scale well. The issue of at the same time accomplishing fine-grainedness, scalability, and data confidentiality of access control really still remains uncertain. This paper addresses this open issue by, on one hand, characterizing and implementing access policies based on data qualities, and, then again, permitting the data owner to representative the majority of the calculation undertakings included in fine-grained data access control to un-trusted cloud servers without unveiling the underlying data substance. We accomplish this goal by exploiting and combining techniques of decentralized key policy Attribute Based Encryption (KP-ABE) . Extensive investigation shows that the proposed approach is highly efficient and secure. Keywords: Access Control, Cloud Computing, Key Policy Attribute Based Encryption (KP-ABE) I. INTRODUCTION Cloud computing is a promising computing model which currently has drawn far reaching consideration from both the educational community and industry. By joining a set of existing and new procedures from research areas, for example, Service-Oriented Architectures (SOA) and virtualization, cloud computing is viewed all things considered a computing model in which assets in the computing infrastructure are given as services over the Internet. It is a new business solution for remote reinforcement outsourcing, as it offers a reflection of interminable storage space for customers to have data reinforcements in a pay-as- you- go way [1]. It helps associations and government offices fundamentally decrease their financial overhead of data administration, since they can now store their data reinforcements remotely to third- party cloud storage suppliers as opposed to keep up data centers on their own. Numerous services like email, Net banking and so forth… are given on the Internet such that customers can utilize them from anyplace at any time. Indeed cloud storage is more adaptable, how the security and protection are accessible for the outsourced data turns into a genuine concern. The three points of this issue are availability, confidentiality and integrity. To accomplish secure data transaction in cloud, suitable cryptography method is utilized. The data possessor must encrypt the record and then store the record to the cloud. Assuming that a third person downloads the record, they may see the record if they had the key which is utilized to decrypt the encrypted record. Once in a while this may be failure because of the technology improvement and the programmers. To overcome the issue there is lot of procedures and techniques to make secure transaction and storage.
  • 2. MigrantSystems International Journal of Inventions in Computer Science and Engineering ISSN (Online): 2348 – 3539, ISSN (Print): 2348 – 3431 Volume 1 Issue 2 2014. __________________________________________________________________________________________ 03.2014-12CSE05 www.ijicse.com Recently [2] addressed Anonymous authentication for data archiving to clouds. Anonymous authentication is the procedure of accepting the client without the details of the client. So the cloud server doesn’t know the details of the client, which gives security to the clients to conceal their details from other clients of that cloud. Security and privacy assurance in clouds are analyzed and tested by numerous researchers. [3] gives storage security utilizing Reed-Solomon eradication correcting codes. Utilizing homomorphic encryption, [4] the cloud gains cipher text and furnishes an encoded value of the result. The client has the capacity to translate the result; however the cloud does not comprehend what data it has worked on. In this paper key policy Attribute Based Encryption scheme is used to control unauthorized access. In addition revocation scheme is used for time based file assured deletion. II. RELATED WORK Access control in clouds is gaining consideration on the grounds that it is imperative that just authorized clients have access to services. A colossal measure of data is constantly archived in the cloud, and much of this is sensitive data. Utilizing Attribute Based Encryption (ABE), the records are encrypted under a few access strategy furthermore saved in the cloud. Clients are given sets of traits and corresponding keys. Just when the clients have matching set of attributes, would they be able to decrypt the data saved in the cloud. [5][6] Studied the access control in health care. Access control is likewise gaining imperativeness in online social networking where users store their personal data, pictures, films and shares them with selected group of users they belong. Access control in online social networking has been studied in [7]. The work done by [8] gives privacy preserving authenticated access control in cloud. Nonetheless, the researchers take a centralized methodology where a single key distribution center (KDC) disperses secret keys and attributes to all clients. Unfortunately, a single KDC is not just a single point of failure however troublesome to uphold due to the vast number of clients that are upheld in a nature's domain. The scheme In [9] uses a symmetric key approach and does not support authentication. Multi-authority ABE principle was concentrated on in [10], which obliged no trusted power which requires each client to have characteristics from at all the KDCs. In spite of the fact that Yang et al. [11] proposed a decentralized approach, their strategy does not confirm clients, who need to remain anonymous while accessing the cloud. Ruj et al. [12] proposed a distributed access control module in clouds. On the other hand, the approach did not provide client verification. The other weakness was that a client can make and store an record and different clients can just read the record. write access was not allowed to clients other than the originator. Time-based file assured deletion, which is initially presented in [13], implies that records could be safely erased and remain forever difficult to reach after a predefined time. The primary thought is that a record is encrypted with an information key by the possessor of the record, and this information key is further encrypted with a control key by a separate key Manager.
  • 3. MigrantSystems International Journal of Inventions in Computer Science and Engineering ISSN (Online): 2348 – 3539, ISSN (Print): 2348 – 3431 Volume 1 Issue 2 2014. __________________________________________________________________________________________ 03.2014-12CSE05 www.ijicse.com Fig 1 Cloud Architecture III. PROPOSED METHODOLOGY A. Distributed Key Policy Attribute Based Encryption KP-ABE is a public key cryptography primitive for one-to-many correspondences. In KP-ABE, information is associated with attributes for each of which a public key part is characterized. The encryptor associates the set of attributes to the message by scrambling it with the comparing public key parts. Every client is assigned an access structure which is normally characterized as an access tree over information attributes, i.e., inside hubs of the access tree are limit doors and leaf hubs are connected with attributes. Client secret key is characterized to reflect the access structure so the client has the ability to decode a cipher-text if and just if the information attributes fulfill his access structure. The proposed scheme consists of four algorithms which is defined as follows Setup: This algorithm takes as input security parameters and attribute universe of cardinality N. It then defines a bilinear group of prime number. It returns a public key and the master key which is kept secret by the authority party. Encryption: It takes a message, public key and set of attributes. It outputs a cipher text. Key Generation: It takes as input an access tree, master key and public key. It outputs user secret key.
  • 4. MigrantSystems International Journal of Inventions in Computer Science and Engineering ISSN (Online): 2348 – 3539, ISSN (Print): 2348 – 3431 Volume 1 Issue 2 2014. __________________________________________________________________________________________ 03.2014-12CSE05 www.ijicse.com Decryption: It takes as input cipher text, user secret key and public key. It first computes a key for each leaf node. Then it aggregates the results using polynomial interpolation technique and returns the message. B. File Assured Deletion The policy of a file may be denied under the request by the customer, when terminating the time of the agreement or totally move the files starting with one cloud then onto the next cloud nature's domain. The point when any of the above criteria exists the policy will be repudiated and the key director will totally evacuates the public key of the associated file. So no one can recover the control key of a repudiated file in future. For this reason we can say the file is certainly erased. To recover the file, the user must ask for the key supervisor to produce the public key. For that the user must be verified. The key policy attribute based encryption standard is utilized for file access which is verified by means of an attribute connected with the file. With file access control the file downloaded from the cloud will be in the arrangement of read just or write underpinned. Every client has connected with approaches for each one file. So the right client will access the right file. For making file access the key policy attribute based encryption. IV. CONCLUSION We have introduced a decentralized access control system with anonymous authentication, which gives client renouncement also prevents replay attacks. The cloud does not know the identity of the client who saves data, however just checks the client's certifications. Key dissemination is carried out in a decentralized manner. One limit is that the cloud knows the access strategy for each one record saved in the cloud. REFERENCES 1. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A View of Cloud Computing. Comm. of the ACM, 53(4):50– 58, Apr 2010. 2. Sushmita Ruj, Milos Stojmenovic and Amiya Nayak,“Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS. 3. Wang, Q.Wang, K.Ren, N.Cao and W.Lou, “Toward Secure and Dependable Storage Services in Cloud Computing”, IEEE T.Services Computing, Vol. 5, no.2, pp. 220-232, 2012. 4. C.Gentry, “A fully homomorphic encryption scheme”, Ph.D. dissertation, Stanford University, 2009, http://www.crypto.stanford.edu/craig. 5. personal M. Li, S. Yu, K. Ren, and W. Lou, “Securing health records in cloud computing: Patient-centric and fine-grained data access control in multi owner settings,” in SecureComm, pp. 89–106, 2010. 6. S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in ACM ASIACCS, pp. 261–270, 2010. 7. S. Jahid, P. Mittal, and N. Borisov, “EASiER: Encryption-based access control in social networks with efficient revocation,” in ACM ASIACCS, 2011. 8. F. Zhao, T. Nishide, and K. Sakurai, “Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems,” in ISPEC, ser. Lecture Notes in Computer Science, vol. 6672. Springer, pp. 83–97, 2011.
  • 5. MigrantSystems International Journal of Inventions in Computer Science and Engineering ISSN (Online): 2348 – 3539, ISSN (Print): 2348 – 3431 Volume 1 Issue 2 2014. __________________________________________________________________________________________ 03.2014-12CSE05 www.ijicse.com 9. W. Wang, Z. Li, R. Owens, and B. Bhargava, “Secure and efficient access to outsourced data,” in ACM Cloud Computing Security Workshop (CCSW), 2009. 10. M. Chase and S. S. M. Chow, “Improving privacy and security in multi authority attribute-based encryption,” in ACM Conference on Computer and Communications Security, pp. 121–130, 2009. 11. Kan Yang, Xiaohua Jia and Kui Ren, “ DAC-MACS: Effective Data Access Control for Multi- Authority Cloud Storage Systems”, IACR Cryptology ePrint Archive, 419, 2012. 12. S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed access control in clouds,” in IEEE TrustCom, 2011. 13. . Perlman, “File System Design with Assured Delete,” Proc.Network and Distributed System Security Symp. ISOC (NDSS), 2007.