Decentralized Access Control to Secure Data Storage on Clouds

Main Article Content

D.V. Himaja
K.Lakshmi
Dr.S.Prem Kumar

Abstract

Cloud computing is a growing computing standard in which the computing structure is given as a examine over the Internet. The Cloud computing tool gives ability of data storage and access for cloud users, but when outsourcing the data to a third party results in safety issue of cloud data so data are confined by restricting the data. We propose a new decentralized access control system for secure data storage in the clouds that supports anonymous authentication. In this method, the cloud checks the means of the series without knowing the user’s individuality before storing data in the clouds. Our method adds extra feature in access control for which only skilled users are able to decrypt the data stored on cloud. This method prevents repeat attacks and supports the creation, alteration, and reading data stored in the cloud. We also address, user revocation. We propose a new representation for data storage and access in clouds. Our method avoids storing multiple encrypted copies of the same data. In our structure for secure data storage, cloud stores encrypted data (without being able to decrypt them). The main innovation of this model is addition of key distribution centers (KDCs).

Article Details

How to Cite
[1]
D.V. Himaja, K.Lakshmi, and Dr.S.Prem Kumar, “Decentralized Access Control to Secure Data Storage on Clouds”, Int. J. Comput. Eng. Res. Trends, vol. 3, no. 1, pp. 13–18, Jan. 2016.
Section
Research Articles

References

Sushmita Ruj, Member, IEEE, Milos Stojmenovic, Member, IEEE, and Amiya Nayak, Senior Member, “Decentralized Access Control with

AnonymousAuthentication of Data Stored in Clouds” IEEE,2014.

Ajith Singh. N, Department of computer science, Karpagam University, Coimbatore, India, M. Hemalatha, Department of software systems & research,

Karpagam University, Coimbatore, India, “Cloud computing for Academic Environment”.

Luit Infotech Private Limited, Bangalore, India, “Luit Infotech SaaS Business Software”.

Wang, Q.Wang, K.Ren, N.Cao and W.Lou, “Toward Secure and Dependable Storage Services in Cloud Computing”, IEEE Services Computing, Vol. 5, no.2, pp. 220-232, 2012.

C. Gentry, “A fully homomorphic encryption scheme”, Ph.D. dissertation, Stanford University, 2009, http://www.crypto.stanford.edu/craig.

Yang Tang, Patrick P.C. Lee, John C.S. Lu and Radia Perlman, “Secure Overlay Cloud Storage with Access Control and Assured Deletion”, IEEE

Transactions on dependable and secure computing, VOL.9, NO. 6, NOVEMBER/DECEMBER 2012

R. Perlman, “File System Design with Assured Delete,” Proc. Network and Distributed System Security Symp. ISOC (NDSS), 2007

Personal M. Li, S. Yu, K. Ren, and W. Lou, “Securing health records in cloud computing: Patient-centric and fine-grained data access control in multi owner settings,” in SecureComm, pp. 89–106, 2010.

S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in ACM ASIACCS, pp. 261–270, 2010.

F. Zhao, T. Nishide, and K. Sakurai, “Realizing fine grained and flexible access control to outsourced data with attribute-based cryptosystems,” in ISPEC, sir. Lecture Notes in Computer Science, vol. 6672. Springer, pp. 83–97, 2011.

W. Wang, Z. Li, R. Owens, and B. Bhargava, “Secure and efficient access to outsourced data,” in ACM Cloud Computing Security Workshop (CCSW), 2009.

M. Chase and S. S. M. Chow, “Improving privacy and security in multi authority attribute-based encryption,” in ACM Conference on Computer and Communications Security, pp. 121–130, 2009.

Ken Yang, Xiaohua Jia and Kui Ren, “DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems”, IACR Cryptology ePrint Archive, 419, 2012.

15.S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed access control in clouds,” in IEEE TrustCom, 2011.

[16]Perlman, “File System Design with Assured Delete,” Proc. Network and Distributed System Security Symp. ISOC (NDSS), 2007.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. ACM Conf.

Computer and Comm. Security, pp. 89-98, 2006.

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext Policy Attribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy, pp. 321-334, 2007.

X. Liang, Z. Cao, H. Lin, and D. Xing, “Provably Secure and Efficient Bounded Ciphertext Policy Attribute Based Encryption,” Proc. ACM Symp.

Information, Computer and Comm. Security (ASIACCS), pp 343-352, 2009.

M. Chase, “Multi-Authority Attribute Based Encryption,” Proc. Fourth Conf. Theory of Cryptography (TCC), pp. 515-534, 2007.

H.K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-Based Signatures,” Topics in Cryptology - CT RSA, vol. 6558, pp. 376-392, 2011.

A.B. Lewko and B. Waters, “Decentralizing Attribute BasedEncryption,”Proc.Ann.Int’lConf.AdvancesinCrypto logy(EURO- CRYPT),pp. 568-588,2011. [27] S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds,” Proc. IEEE/ACM Int’l Symp. Cluster, Cloud and Grid Computing, pp. 556- 563, 2012.

“DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS”Ankita N.Madde , Minal J. Joshi, Suchita Gutte, Sonal Asawa, Prashant Jawalkar Computer Dept., JSPM’s BSIOTR, Pune, India.

Most read articles by the same author(s)

1 2 > >>