Study on Competent and Revocable Data Access Control Scheme for Multi-Authority Cloud Storage Systems

Main Article Content

A.Shekinah prema sunaina

Abstract

Cloud computing multi-tenancy feature, which provides privacy, security and access control challenges, because of sharing of physical resources among untrusted tenants. In order to achieve safe storage, policy based file access control, policy based file assured deletion and policy based renewal of a file stored in a cloud environment, a suitable encryption technique with key management should be applied before outsourcing the data. Cipher text-Policy Attribute-based Encryption (CP-ABE) is considered as one of the most suitable scheme for data access control in cloud storage. This scheme provides data owners more direct control on access policies. However, CP-ABE schemes to data access control for cloud storage systems are difficult because of the attribute revocation problem. So this paper produce investigation on competent and revocable data access control scheme for multi-authority cloud storage systems, where there are multiple authorities cooperate and each authority is able to issue attributes independently. Specifically, this paper surveys a revocable multi-authority CP-ABE scheme. The attribute revocation method can efficiently achieve both forward security and backward security.

Article Details

How to Cite
[1]
A.Shekinah prema sunaina, “Study on Competent and Revocable Data Access Control Scheme for Multi-Authority Cloud Storage Systems”, Int. J. Comput. Eng. Res. Trends, vol. 2, no. 5, pp. 365–368, May 2015.
Section
Research Articles

References

. S.Yu, C.Wang, K.Ren, and W.Lou, „„Attribute Based Data Sharing with Attribute Revocation,‟‟ in Proc. 5th ACM Symp. Information, Computer and Comm. Security (ASIACCS‟10), 2010, pp. 261-270.

. J. Hur and D.K. Noh, „„Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,‟‟ IEEE Trans. Parallel Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011.

. S.Jahid, P.Mittal, and N.Borisov, „„Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation,‟‟ in Proc. 6th ACM Symp. Information, Computer and Comm. Security (ASIACCS‟11), 2011, pp. 411-415.

. M. Li, S. Yu, Y. Zheng, K. Ren, andW.Lou, „„Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,‟‟ IEEE Trans. Parallel Distributed Systems, vol. no. 1, pp. 131-143, Jan. 2013. 24,

. Kan Yang, and Xiaohua Jia, „„Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage,‟‟ IEEE transactions on parallel and distributed systems, vol. 25, no. 7, july 2014.

MrSanthoshkumarB.J, M.Tech, Amrita VishwaVidyapeetham, Mysore Campus, India “Attribute Based Encryption with Verifiable Outsourced Decryption.” In International Journal of Advanced Research in Computer Science and Software Engineering”Volume 4, Issue 6, June 2014,ISSN: 2277 128X.

Tejaswini R M1, Roopa C K2 , Ayesha Taranum “Securing Cloud Server & Data Access withMulti-Authorities” International Journal of Computer Science and Information Technology Research ISSN 2348- 120X Vol. 2, Issue 2, pp: (297-302), Month: April-June 2014.