Research Article

Fastest Access of Secured Data in Cloud storage by using Attribute-based Encryption

by  Ramiz Shaikh, Ankit Dongre
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Issue 1
Published: October 2015
Authors: Ramiz Shaikh, Ankit Dongre
10.5120/ijca2015906310
PDF

Ramiz Shaikh, Ankit Dongre . Fastest Access of Secured Data in Cloud storage by using Attribute-based Encryption. International Journal of Computer Applications. 127, 1 (October 2015), 17-20. DOI=10.5120/ijca2015906310

                        @article{ 10.5120/ijca2015906310,
                        author  = { Ramiz Shaikh,Ankit Dongre },
                        title   = { Fastest Access of Secured Data in Cloud storage by using Attribute-based Encryption },
                        journal = { International Journal of Computer Applications },
                        year    = { 2015 },
                        volume  = { 127 },
                        number  = { 1 },
                        pages   = { 17-20 },
                        doi     = { 10.5120/ijca2015906310 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2015
                        %A Ramiz Shaikh
                        %A Ankit Dongre
                        %T Fastest Access of Secured Data in Cloud storage by using Attribute-based Encryption%T 
                        %J International Journal of Computer Applications
                        %V 127
                        %N 1
                        %P 17-20
                        %R 10.5120/ijca2015906310
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud security is the most critical task while considering its working environment, i.e. outsourced, distributed and utility based. In such cases making the users data confidential, increases the trust over the system. Also the security procedure does not make the availability affected in any ways. The users of these kind of systems is always retained the services and securities preliminaries with respect to the data itself. As the cloud user can access its data frequently and if here some encryption is used which requires decryption and the repetitive process continues to increase the overheads. It requires some mechanism in which encryption is performed and if the user requires to perform some operations on secure file without decrypting it can be fulfilled. Thus homomorphic encryption lets the user facilitates about the performing operations on encrypted data which reduces the complexity of confidentiality operations. Also to prevent Cloud Servers from being able to learn both the data file contents and user access privilege information used to generate key along with the fastest access of secured data by using Attribute-based encryption (ABE).

References
  • Shucheng Yu, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing”, in Proceedings of IEEE Infocomm, ISSN: 978-1-4244-5837-0/10, 2010.
  • Srijith“Towards Secure Cloud Bursting,Brokerage and Aggregation” 2010 Eighth IEEE European conference on web services
  • Cong Wang, Student Member, IEEE, Sherman S.-M. Chow, Qian Wang, Student Member, IEEE,KuiRen, Member, IEEE, and Wenjing Lou, Member, IEEE “Privacy-Preserving Public Auditing for Secure Cloud Storage, IEEE-2012
  • Cong Wang1, Qian Wang1, Kui Ren1, and Wenjing Lou2,” Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, IEEE INFOCOM 2010, San Diego, CA, March 2010
  • Ms. Vaishnavi Moorthy1, Dr. S. Sivasubramaniam2,” Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing, IOSR Journal of EngineeringMar. 2012, Vol. 2(3) pp: 496-500
  • C. Hota, S. Sanka, M. Rajarajan, S. Nair, "Capability-based Cryptographic Data Access Control in Cloud Computing", in International Journal of Advanced Networking and Applications, Volume 01, Issue 01, 2011.
  • Rosario Gennaro and Daniel Wichs, Fully Homomorphic Message Authenticators IBM Research, T.J. Watson, May 23, 2012
  • K. Kajendran, J. Jeyaseelan, J. Joshi, “An Approach for secures Data storage using Cloud Computing” In International Journal of Computer Trends and Technology- May to June Issue 2011
  • W. Luo, G. Bai, “Ensuring the Data Integrity In Cloud computing” In Proceedings of IEEE CCIS, 2011.
  • S. Sanka, C. Hota, and M. Rajarajan, “Secure data access in cloud computing,” in 2010 IEEE 4th International http://en.wikipedia.org/wiki
  • H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp. 90–107.
  • Dianli GUO and Fengtong WEN, “A More Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment”, in Journal of Computational Information Systems, ISSN; 1553–9105, Vol. 9:No. 2, 2013, 407-413
  • Kristin Lauter, Michael NaehrigandVinodVaikuntanathan, “Can Homomorphic Encryption be Practical”, in ACM, 2008.
  • Craig Gentry, “Computing Arbitrary Functions of Encrypted Data”, in ACM by IBM T.J. Watson Research Center, 2008.
  • Bharath K. Samanthula, Gerry Howser, Yousef Elmehdwi, and Sanjay Madria, “An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud”, in Cloud 1st conference by ACM, ISSN: 978-1-4503, DOI: 1596-8/12/08, 2012.
  • Robert Griffin and SubhashSankuratripati, “Key Management Interoperability Protocol Profile Version 1.1”, in OASIS Standards Organizations at http://docs.oasis-open.org/kmip/profiles/v1.1/os/kmip-profiles-v1.1-os.doc, 2013.
  • Web Article, “Amazon Web Services: Overview of Security Processes” by Amazon Services at http://aws.amazon.com/security,June 2013.
  • K. Raen, C. Wang, Q. Wang, “Security Challenges for the Public Cloud”, Published by IEEE Computer Society, Jan/Feb 2012
  • J.-P. Aumasson, L. Henzen, W. Meier, and R. Phan, “SHA-3 proposal BLAKE,” December 2010.
  • GALS System Design: Side Channel Attack Secure Cryptographic Accelerators
  • AES encryption and decryption http://www.iis.ee.ethz.ch/~kgf/acacia/c3.html
  • Kamara, S., Lauter, K.: “Cryptographic cloud storage”. In: Proceedings of the 14th international conference on Financial cryptography and data security, FC'10, pp. 136-149. Springer-Verlag, Berlin, Heidelberg (2010)
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Attribute Based Encryption Cloud Storage Data Storage Holomorphic.

Powered by PhDFocusTM