Decentralized and Secured Data Sharing in Distributed Cloud Environment
Abstract
secure data storage in clouds, which supports hiding identity
& access policy of user’s with anonymous authentication.
Data on cloud is sensitive and so as the user and his identity.
It is necessary to the user identity from cloud. Our proposed
system deals with the data security and hiding user identity.
We are using Anonymous authentication decentralized access
control system for storing the data securely on cloud. With
prevention from replay attacks our scheme also support
creation, modification, and reading data stored in the cloud
and also the users attributes are also kept hidden. We are
using Trustee for hiding the user identity; where the user will
be know by unique tokens. Along with this our scheme will
also deal with user revocation. As compare to other schemes
our scheme is decentralized and robust. The efficiency of the
proposed schemes is tested by comparing communication,
computation and storage overheads with centralized
approaches.
Full Text:
PDFReferences
S. Jahid, P. Mittal, and N. Borisov, "EASiER:
Encryption-based access control in social networks
with efficient revocation," in ACM ASIACCS, 2011.
C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou,
"Toward Secure and Dependable Storage Services in
Cloud Computing", IEEE T. Services Computing, vol.
, no. 2, pp. 220–232, 2012.
H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based
authentication for cloud computing," in CloudCom,
ser. Lecture Notes in Computer Science, vol. 5931.
Springer, pp. 157–166, 2009.
C. Gentry, "A fully homomorphic encryption scheme,"
Ph.D. dissertation, Stanford University, 2009,
http://www.crypto.stanford.edu/craig.
A.-R. Sadeghi, T. Schneider, and M. Winandy,
"Token-based cloud computing," in TRUST, ser.
Lecture Notes in Computer Science, vol.
Springer, pp. 417–429, 2010.
W. Wang, Z. Li, R. Owens, and B. Bhargava, "Secure
and efficient access to outsourced data," in ACM
Cloud Computing Security Workshop (CCSW), 2009.
http://securesoftwaredev.com/2012/08/20/xacml-inthe-
cloud.
M. Li, S. Yu, K. Ren, and W. Lou, "Securing personal
health records in cloud computing: Patient-centric and
fine-grained data access control in multiowner
settings," in SecureComm, pp. 89–106, 2010.
S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based
data sharing with attribute revocation," in ACM
ASIACCS, pp. 261–270, 2010.
G. Wang, Q. Liu, and J. Wu, "Hierarchical attributebased
encryption for fine-grained access control in
cloud storage services," in ACM CCS, , pp. 735–737,
F. Zhao, T. Nishide, and K. Sakurai, "Realizing finegrained
and flexible access control to outsourced data
with attribute-based cryptosystems," in ISPEC, ser.
Lecture Notes in Computer Science, vol. 6672.
Springer, pp. 83–97, 2011.
S. Ruj, A. Nayak, and I. Stojmenovic, "DACC:
Distributed access control in clouds," in IEEE
TrustCom, 2011.
Kan Yang, Xiaohua Jia and Kui Ren, " DAC-MACS:
Effective Data Access Control for Multi-Authority
Cloud Storage Systems", IACR Cryptology ePrint
Archive, 419, 2012.
M. Chase, "Multi-authority attribute based
encryption," in TCC, ser. Lecture Notes in Computer
Science, vol. 4392. Springer, pp. 515–534, 2007.
H. Lin, Z. Cao, X. Liang and J. Shao, "Secure
Threshold Multi-authority Attribute Based Encryption
without a Central Authority," in INDOCRYPT, ser.
Lecture Notes in Computer Science, vol. 5365,
Springer, pp. 426–436, 2008.
M. Chase and S. S. M. Chow, "Improving privacy and
security in multiauthority attribute-based encryption,"
in ACM Conference on Computer andCommunications
Security, pp. 121–130, 2009.
A. B. Lewko and B. Waters, "Decentralizing attributebased
encryption," in EUROCRYPT, ser. Lecture Notes
in Computer Science, vol. 6632. Springer, pp. 568–
, 2011.
Matthew Green, Susan Hohenberger and Brent Waters,
"Outsourcing the Decryption of ABE Ciphertexts," in
USENIX Security Symposium, 2011.
Sushmita Ruj, Milos Stojmenovic, Amiya Nayak CSE,
Indian Institute of Technology, IIT, Indore,
India,Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds.
S. Ruj, M. Stojmenovic and A. Nayak, Privacy
Preserving Access Control with Authentication for
Securing Data in Clouds, IEEE/ACM International
Symposium on Cluster, Cloud and Grid Computing,
pp. 556563, 2012.
S. Yu, C. Wang, K. Ren, and W. Lou, Attribute based
data sharing with attribute revocation, in ACM
ASIACCS, pp. 261270, 2010.
J. Hur and D. Kun Noh, Attribute-Based Access
Control with Efficient Revocation in Data Outsourcing
Systems, IEEE Trans. Parallel Distrib. Syst., vol. 22,
no. 7, pp. 12141221, 2011.
J. Bethencourt, A. Sahai, and B. Waters, Ciphertextpolicy
attribute-based encryption, in IEEE Symposium
on Security and Privacy. , pp. 321334, 2007.
V. Goyal, O. Pandey, A. Sahai, and B. Waters,
Attribute-based encryption for finegrained access
control of encrypted data, in ACM Conference on
Computer and Communications Security, pp. 8998,
Matthew Green, Susan Hohenberger and Brent Waters,
Outsourcing the Decryption of ABE Ciphertexts, in
USENIX Security Symposium, 2011
http://opendata.pinellasegis.opendata.arcgis.com/datas
ets/bc116cd6828f4082bf3b2cf4492dc68d_
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology