Improved Self-destructing Scheme by Fine grained approach in Cloud Computing
D.Farooq Basha, R.Vara Prasad, Dr S.Prem Kumar, ,
Affiliations (M.Tech), CSEAssistant Professor, Department of Computer Science and EngineeringProfessor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
: Cloud computing, a recent computing technology entirely changed the IT industry. Large amount of data
can be stored in cloud storage system. Security is the prime concern for this large amount of data. Without,
knowledge of authorized client, data can be viewed by other user. This data contain personal information like,
account number, password and notes. All the data and their copies become self-destructed after user specified time,
without any user intervention. Fine grained approach is used for authorized data accessing, which provides high
secured authorization for data accessing thus it achieves data confidentiality. Self-destruction method is consociated
with time to live (TTL) property to specify the life time of the keys. After user specified time (TTL) data and its keys
becomes destructed or unreadable. Self-destruction mechanism helps reducing overhead during upload and
download process in cloud.
D.Farooq Basha,R.Vara Prasad,Dr S.Prem Kumar."Improved Self-destructing Scheme by Fine grained approach in Cloud Computing". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 09,pp.531-536, SEPTEMBER - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I902.pdf,
Keywords : Time-to-Live (TTL), Controlling, Self Destructing, Fine grained Approach
 S Sushmita Ruj, Milos Stojmenovic and Amiya Nayak, â€œDecentralized Access Control with Anonymous Authentication of Data Stored in Cloudsâ€, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
 C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, â€œToward Secure and Dependable Storage Services in Cloud Computing,â€ IEEE Trans. Services Computing, Apr.- June 2012.
 H. Li, Y. Dai, L. Tian, and H. Yang, â€œIdentityBased Authentication for Cloud Computing,â€ Proc. First Intâ€™l Conf. Cloud Computing, 2009.
 C. Gentry, â€œA Fully Homomorphic Encryption Scheme,â€ PhD dissertation, Stanford Univ., 2009.
 A.-R. Sadeghi, T. Schneider, and M. Winandy, â€œToken-Based Cloud Computing,â€ Proc. Third Intâ€™l Conf. Trust and Trustworthy Computing (TRUST), 2010.
 M. Li, S. Yu, K. Ren, and W. Lou, â€œSecuring Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings,â€ Proc. Sixth Intâ€™l ICST Conf. Security and Privacy in Comm. Networks (SecureComm), 2010.
 S. Yu, C. Wang, K. Ren, and W. Lou, â€œAttribute Based Data Sharing with Attribute Revocation,â€ Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), 2010.
 G. Wang, Q. Liu, and J. Wu, â€œHierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services,â€ Proc. 17th ACM Conf. Computer and Comm. Security (CCS), 2010.
 F. Zhao, T. Nishide, and K. Sakurai, â€œRealizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems,â€ Proc. Seventh Intâ€™l Conf. Information Security Practice and Experience (ISPEC), 2011.
 S. Ruj, A. Nayak, and I. Stojmenovic, â€œDACC: Distributed Access Control in Clouds,â€ Proc. IEEE 10th Intâ€™l Conf. Trust, Security and Privacy in Computing and Communications (TrustCom), 2011.
 S.SeenuIropia, R.Vijayalakshmi, â€œDecentralized Access Control Of Data Stored In Clouds Using Key Policy Attribute Based Encryptionâ€, International Journal Of Invention In Computer Science And Engineering, 2014.
 http://securesoftwaredev.com/2012/08/20/xacml-inthe-cloud, 2013.
 R.L. Rivest, A. Shamir, and Y. Tauman, â€œHow to Leak a Secret,â€ Proc. Seventh Intâ€™l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT), 2001.
 X. Boyen, â€œMesh Signatures,â€ Proc. 26th Ann. Intâ€™l Conf. Advances in Cryptology (EUROCRYPT), 2007.
 D. Chaum and E.V. Heyst, â€œGroup Signatures,â€ Proc. Ann. Intâ€™l Conf. Advances in Cryptology (EUROCRYPT), 1991.
 H.K. Maji, M. Prabhakaran, and M. Rosulek, â€œAttribute-Based Signatures: Achieving AttributePrivacy and Collusion-Resistance,â€ IACR Cryptology ePrint Archive, 2008.
 K. Yang, X. Jia, and K. Ren, â€œDAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems,â€ IACR Cryptology ePrint Archive, 2012.
 W. Wang, Z. Li, R. Owens, and B. Bhargava, â€œSecure and Efficient Access to Outsourced Data,â€ Proc. ACM Cloud Computing Security Workshop (CCSW), 2009.
Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors.
News & Events
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞ LAST DATE OF SUBMISSION : 31st March 2023
☞ SUBMISSION TO FIRST DECISION : In 7 Days
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION
All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.