Decentralized Access Control to Secure Data Storage on Clouds
Main Article Content
Abstract
Cloud computing is a growing computing standard in which the computing structure is given as a examine over the Internet. The Cloud computing tool gives ability of data storage and access for cloud users, but when outsourcing the data to a third party results in safety issue of cloud data so data are confined by restricting the data. We propose a new decentralized access control system for secure data storage in the clouds that supports anonymous authentication. In this method, the cloud checks the means of the series without knowing the user’s individuality before storing data in the clouds. Our method adds extra feature in access control for which only skilled users are able to decrypt the data stored on cloud. This method prevents repeat attacks and supports the creation, alteration, and reading data stored in the cloud. We also address, user revocation. We propose a new representation for data storage and access in clouds. Our method avoids storing multiple encrypted copies of the same data. In our structure for secure data storage, cloud stores encrypted data (without being able to decrypt them). The main innovation of this model is addition of key distribution centers (KDCs).
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
Sushmita Ruj, Member, IEEE, Milos Stojmenovic, Member, IEEE, and Amiya Nayak, Senior Member, “Decentralized Access Control with
AnonymousAuthentication of Data Stored in Clouds” IEEE,2014.
Ajith Singh. N, Department of computer science, Karpagam University, Coimbatore, India, M. Hemalatha, Department of software systems & research,
Karpagam University, Coimbatore, India, “Cloud computing for Academic Environment”.
Luit Infotech Private Limited, Bangalore, India, “Luit Infotech SaaS Business Software”.
Wang, Q.Wang, K.Ren, N.Cao and W.Lou, “Toward Secure and Dependable Storage Services in Cloud Computing”, IEEE Services Computing, Vol. 5, no.2, pp. 220-232, 2012.
C. Gentry, “A fully homomorphic encryption scheme”, Ph.D. dissertation, Stanford University, 2009, http://www.crypto.stanford.edu/craig.
Yang Tang, Patrick P.C. Lee, John C.S. Lu and Radia Perlman, “Secure Overlay Cloud Storage with Access Control and Assured Deletion”, IEEE
Transactions on dependable and secure computing, VOL.9, NO. 6, NOVEMBER/DECEMBER 2012
R. Perlman, “File System Design with Assured Delete,” Proc. Network and Distributed System Security Symp. ISOC (NDSS), 2007
Personal M. Li, S. Yu, K. Ren, and W. Lou, “Securing health records in cloud computing: Patient-centric and fine-grained data access control in multi owner settings,” in SecureComm, pp. 89–106, 2010.
S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in ACM ASIACCS, pp. 261–270, 2010.
F. Zhao, T. Nishide, and K. Sakurai, “Realizing fine grained and flexible access control to outsourced data with attribute-based cryptosystems,” in ISPEC, sir. Lecture Notes in Computer Science, vol. 6672. Springer, pp. 83–97, 2011.
W. Wang, Z. Li, R. Owens, and B. Bhargava, “Secure and efficient access to outsourced data,” in ACM Cloud Computing Security Workshop (CCSW), 2009.
M. Chase and S. S. M. Chow, “Improving privacy and security in multi authority attribute-based encryption,” in ACM Conference on Computer and Communications Security, pp. 121–130, 2009.
Ken Yang, Xiaohua Jia and Kui Ren, “DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems”, IACR Cryptology ePrint Archive, 419, 2012.
15.S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed access control in clouds,” in IEEE TrustCom, 2011.
[16]Perlman, “File System Design with Assured Delete,” Proc. Network and Distributed System Security Symp. ISOC (NDSS), 2007.
V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. ACM Conf.
Computer and Comm. Security, pp. 89-98, 2006.
J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext Policy Attribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy, pp. 321-334, 2007.
X. Liang, Z. Cao, H. Lin, and D. Xing, “Provably Secure and Efficient Bounded Ciphertext Policy Attribute Based Encryption,” Proc. ACM Symp.
Information, Computer and Comm. Security (ASIACCS), pp 343-352, 2009.
M. Chase, “Multi-Authority Attribute Based Encryption,” Proc. Fourth Conf. Theory of Cryptography (TCC), pp. 515-534, 2007.
H.K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-Based Signatures,” Topics in Cryptology - CT RSA, vol. 6558, pp. 376-392, 2011.
A.B. Lewko and B. Waters, “Decentralizing Attribute BasedEncryption,”Proc.Ann.Int’lConf.AdvancesinCrypto logy(EURO- CRYPT),pp. 568-588,2011. [27] S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds,” Proc. IEEE/ACM Int’l Symp. Cluster, Cloud and Grid Computing, pp. 556- 563, 2012.
“DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS”Ankita N.Madde , Minal J. Joshi, Suchita Gutte, Sonal Asawa, Prashant Jawalkar Computer Dept., JSPM’s BSIOTR, Pune, India.