Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
|
|
- Willis Glenn
- 8 years ago
- Views:
Transcription
1 Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004, Taiwan (R.O.C.) Abstract : Chia-Chun Hsu Computer Science and Information Engineering National Chiayi University Chiayi City 60004, Taiwan (R.O.C. s @mail.ncyu.edu.tw Cloud computing is an improvement product of combining web technology, grid computing and virtualization. It has become one of the most important issues for the information technology in recent years. A lot of applications have been proposed and discussed on the cloud computing environment because it can bring many benefits like reducing the cost of maintaining data centers in an enterprise, low data management cost and retrieval of data whenever you want, etc. As more sensitive and personal data is shared and stored in the cloud computing server, a question of trust on cloud computing is wildly been discussed. One method to alleviate the security worries is storing data in the encrypting form. The drawback of encrypting data is the limitation of usability. In this paper, we construct a group oriented data access model with keyword search that allows multi-users as one sharing group to reduce the duplication of the sharing file. Once the user wants to retrieve the file, he must be in the authorized sharing group and provide correct keywords. The proposed scheme provides the space efficiency for key storage size and computation efficiency for data retrieving. Keywords: Cloud computing, keyword search encryption, hidden vector encryption, broadcast encryption, data access control. I. INTRODUCTION Cloud computing is an improvement product of combining web technology, grid computing and virtualization. It has become one of the most important issues for the information technology in recent years. The cloud computing server provides resources of the computing infrastructure and outsourced storage space as service over the Internet. As a lot of Service-Oriented Architectures (SOA) technique researches have been proposed, the cloud computing service is more powerful and popular. The growth of public clouds and third party databases is dramatic in recent year that represents there is a trend for outsourcing the user data and sharing the data through the Internet. Many Information Technique (IT) enterprises use the cloud computing service to reduce the cost of maintaining their own data centers and take advantage of low data management
2 cost. Thus, more and more data is shared and stored by the third party on Internet. The data stored on Internet usually include some sensitive and personal information; however, the third parties cannot be fully trusted in protecting them. On the other words, the dishonest third party server may maliciously collect user-specific data to get individual records. Making sensitive and personal data stored in encrypted form can let those data be confidential to avoid misuse by the server. Even if the data were stolen by the third parties or attackers, the sensitive secrets cannot be revealed. Only the authorized user can read the data in plaintext form thus the amount of information loss will be limited. The method to solve the problem mentioned before is called keyword search encryption and it becomes an especially challenging issue of database system with encrypted data. In keyword search encryption system, the data owner encrypts data and labels the encrypted file with sets of descriptive attributes; only the authorized user can query out the specified ciphertext with particular keywords and recover it to the plaintext form. The previous work of the keyword search encryption focused on an individual making a query and getting the decrypted file. However, the encrypted files in the cloud shared with a group of users that is usually adopted by a commercial application in practice. Therefore, how to make keyword search encryption more efficient in multiuser access is the major issue of this paper. We construct a method of group oriented data access model with keyword search property. We achieve sharing data to multiple users without any key size and public information extension so that it can reduce the cost of key distribution management and retrieving data in an efficient manner. For example, in an electronic healthcare record system, a patient s medical record is stored in the cloud and will be encrypted under several attributes for security and privacy. And then, the patient s record can be shared with other parties (e.g., transferring the patient for treatment in a different hospital). Making the sharing parties as a group can reduce the duplication of the ciphertext of the sharing record and provide a group oriented access control. In these cases, the patient s record can be retrieved by the authorized group member and certain keywords. The proposed scheme builds the ciphertext-policy keyword search encryption in group oriented data access that means the file will share with multi-users as a group and the file can only be retrieved by the users who belong to the authorized sharing group and provide correct keywords. II. RELATEDWORK A. Broadcast encryption Broadcast encryption allows a user to distribute message securely to a set/group of users in an insecure environment. In 2000, Naor and Pinkas [9] used the threshold secret sharing method to build the first Public Key Broadcast Encryption (PKBE) scheme. The general method of PKBE employed the user s personal key pair to generate the group key for encrypting sharing data. One of the problems in broadcast encryption is how to determine the receiver group although they are stateless. Naor et al. [8] presented an efficient method for solving this problem. Another problem in broadcast encryption is how to reduce the number of ciphertexts to make the system more scalable. This problem has been solved by Boneh et al. s scheme in [5] to achieve the constant size ciphertext. After that lots of papers discussed how to make the broadcast of encryption messages more efficient.
3 Boneh, et al. [4] presented a public key broadcast encryption which required both the broadcast ciphertext and user storage of constant size for stateless receivers. We applied [11] to our proposed scheme. The method of [11] is the latest approach in encryption broadcasting and has the advantages of minimizing the ciphertext. Moreover, it is more efficient than other previous schemes in terms of both transmission and data storage cost. B. Keyword search encryption In 2004, Boneh et al. [2] proposed the Public Key Encryption with Keyword Search (PESK) scheme. In their scheme, the data owner uses receiver s public key to encrypt the data and the related attributes of the data. And then, only the data receiver can use his own private key to create the correct query token (also called Trapdoor ) to query out and decrypt the specific data. PESK is a primitive and simplest keyword search encryption for retrieving the encrypted data, and it is sufficient only for a one-to-one association application between a particular user and a file sharer. After that, Hwang and Lee [7] proposed a scheme that allowed multi-user to query out the same file but in their scheme, the ciphertext size will extend with the number of sharing users. Moreover, Baeket al. [1] provided the method that can revisit the attribute that has been already encrypted with the data. In 2005, Sahai and Waters [12] proposed a novel fuzzy identity-based encryption (also called attribute-based encryption ) in which the user identity is regarded as a descriptive attribute. It is an improvement algorithm of keyword search encryption to define a group of attributes used to set the decrypted condition so that the user who matches the attributes can retrieve the file. Goyal et al. [6] proposed the keypolicy attribute-based encryption that provided the access control mechanism on the encrypted data. C. Hidden vector encryption Hidden vector encryption is a more sophisticated predicate encryption suitable for the search and fine grant access control on encrypted data. In 2007, Boneh and Waters [3] proposed the first hidden vector encryption based on anonymous identity-based encryption. The hidden vector encryption system provides equality predicate to change encrypt file attribute and query token into attribute vector and predicate vector respectively that will protect the privacy of the query. The previous papers of hidden vector encryption like [3] used the compositeorder number system that made the poor performance on computation. Our proposed scheme is based on Park s paper [10] which used prime-order number system can achieve an efficient hidden vector encryption. The complexities of the token size and the pairing cost of creating query token are equal to the number of keywords the user addressed in the query phase. III. THE PROPOSED SCHEME FOR GROUP-ORIENTED DATA ACCESSMODEL WITH KEYWORD SEARCH The proposed scheme is to integrate the concept of the hidden vector encryption of [10] and the broadcast encryption of [11]. The readers can refer to these papers for detail mathematical structures. The system is assumed to be composed of the following parities: a data owner, a group of users who can be the data receivers, the key distribution center and the cloud server. Each user in our system needs to register at the key distribution center to get his own key pair. The data owner uses public information to create temporary keys to
4 encrypt the sharing file and uploads the ciphertext, the header and the identities of the receiving group to the cloud server. The temporary keys are derived by applying some hash functions to a common share key that can effectively reduce the storage space for the user private keys. The data receiver uses his own key pair and the header to create the query token and then transmit it to the cloud server for decryption. The details of the construction of our scheme are listed below (also see Fig. 1). Figure 1. The concept of the proposed scheme
5
6 IV. ANALYSIS AND DISCUSSION Our scheme combines the method of [10] and [11] to achieve a subtle solution on group access to the keyword search encryption. Both [10] and [11] applied the bilinear map complexity assumption and the extension format of bilinear map complexity assumption. Naturally, our scheme can achieve the level of the security that both [10] and [11] proposed. The reader can refer to their papers for details of the security proofs. Although our proposed scheme can achieve highly secure strength in data protection, the privacy of the common share key K and the security of the hash functions are critical to the enciphering mechanism for both messages and attributes. In our scheme, the user only needs to store the keys with the size of two elements of G. The size is smaller than the one in the previous keyword search schemes. And then we take advantage of public parameters of key distribution center to generate the temporary keys of encryption by using the common share key K. The user can derive K if he gets the group header CGH and belongs to the authorized user group. As the result, in
7 our system, we just need to use four elements of G, a user key pairg2 and CGH G2, to carry out the process of encryption and query. Both the query token size and the pairing computation cost of creating a token are constant in our scheme. Compared with the scheme in [7], our scheme is more efficient since in [7], the size of the ciphertext grows with the number of receiving users. Although we sacrifice a little bit security level that the common share key K becomes a core value in the whole system, we achieve the space efficiency of key management and preserve the advantages proposed in [10]. Table 1 gives the performance cost in our scheme. TABLE I. PERFORMANCE COST V. CONCLUSIONS We presented an efficient group oriented data access model in keyword search encryption. The scheme is particularly suitable for the cloud computing environment since it provides fast queries for the encrypted files. The proposed scheme applied the concept of broadcast encryption to extend the keyword search encryption to be efficient for the accesses of the multiple receivers. The size of the user private key storage cannot be scaled up since the temporary keys are used by applying some hash functions. To design a proper application for the designed model is our future work, and we are planning to combine user access structures and file attributes to develop a complete solution in securely retrieving private data from the cloud server. ACKNOWLEDGMENT This work was supported in part by National Science Council under the Grants NSC E REFERENCES 1. J. Baek, R. Safavi-Naini, and W. Susilo, Public key encryption with keyword search revisited, in Computational Science and Its Applications-ICCSA 2008, LNCS, vol. 5072, pp , D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, Public key encryption with keyword search, in Eurocrypt 2004, LNCS, vol. 3027, pp , D. Boneh and B. Waters, Conjunctive, subset, and range queries on encrypted data, in Proceedings of TCC'07, LNCS, vol. 4392, pp , D. Boneh, C. Gentry and B. Waters, Collusion resistant broadcast encryption with short ciphertexts and private keys, in Crypto 05, vol. 3621, pp , D. Boneh, X. Boyen, and E. J. Goh, Hierarchical identity based encryption with constant size ciphertext, in Advances in Cryptology Eurocrypt 05, LNCS, vol. 3494, pp , 2005.
8 6. V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in CCS '06 proceedings of the 13th ACM conference on Computer and communications security, pp , Y. H. Hwang and P.J. Lee, Public key encryption with conjunctive keyword search and its extension to a multi-user system, in Pairing-based Cryptography PAIRING 2007, LNCS, vol. 4575, pp. 2-22, D. Naor, M. Maor, and J. Lotspiech, Revocation and tracing schemes for stateless receivers, in Advances in Cryptology Crypto 01, vol. 2139, pp , M. Naor and B. Pinkas, Efficient trace and revoke schemes, inproceedings of the 4th International Conference on Financial Cryptography (FC 00), vol. 1962, pp. 1 20, J. H. Park, Efficient hidden vector encryption for conjunctive queries on encrypted data, IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 10, pp , J. H. Park, H. J. Kim, M. H. Sung and D. H. Lee, Public key broadcast encryption schemes with shorter transmissions, IEEE Transactions on Broadcasting, vol. 54, no. 3, pp , A. Sahai and B. Waters, Fuzzy identity based encryption, in Advances in Cryptology Eurocrypt 2005, LNCS, vol. 3494, pp , 2005.
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com
More informationAn Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
More informationSecure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy
More informationExperiments in Encrypted and Searchable Network Audit Logs
Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Cisco Systems India Pvt. Ltd Nitte Meenakshi Institute of Technology Email: bhanprak@cisco.com Sashank Dara Cisco Systems
More informationSheltered Multi-Owner Data distribution For vibrant Groups in the Cloud
Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud I.sriram murthy 1 N.Jagajeevan 2 II M-Tech student Assistant.Professor Department of computer science & Engineering Department of
More informationG.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups
SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic s T.Vijayalakshmi 1, Balika J Chelliah 2 & R. Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M.
More informationCloud Based Enterprise Resource Planning Using Software As A Service
Cloud Based Enterprise Resource Planning Using Software As A Service Sujatha A1, Jayasudha R2, Prof Srinivasan. R3 M.Tech (IT) Student, Department of IT, PSV College of Engg & Tech, Krishnagiri, TN.India1
More informationCategorical Heuristic for Attribute Based Encryption in the Cloud Server
Categorical Heuristic for Attribute Based Encryption in the Cloud Server R. Brindha 1, R. Rajagopal 2 1( M.E, Dept of CSE, Vivekanandha Institutes of Engineering and Technology for Women, Tiruchengode,
More informationSecurity over Cloud Data through Encryption Standards
Security over Cloud Data through Encryption Standards Santhi Baskaran 1, Surya A 2, Stephen Pius C 3, Sudesh Goud G 4 1 Professor, 2,3,4 Student, Department of Information Technology, Pondicherry Engineering
More informationData management using Virtualization in Cloud Computing
Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department
More informationAn Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
More informationRole Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
More informationA Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications
A Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications Wei Song 1,2, Yihui Cui 2, and Zhiyong Peng 1,2(B) 1 State Key Laboratory of Software Engineering, Wuhan University, Wuhan,
More informationSemi-Trusted Authentication for Health Data in Cloud
JOURNAL OF COMPUTER SCIENCE AND ENGINEERING Semi-Trusted Authentication for Health Data in Cloud Rajeswari.M 1, Anjelin Lilly Jasmine.P 2, V.Komaladevi 3, K.Monika 4 1 Assistant professor, 2,3,4 Students,
More informationExpressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Abstract: Cloud computing is one of the emerge technologies. To protect the data and privacy of users the access
More informationCLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION
CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION Chandrala DN 1, Kulkarni Varsha 2 1 Chandrala DN, M.tech IV sem,department of CS&E, SVCE, Bangalore 2 Kulkarni Varsha, Asst. Prof.
More informationProviding Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud R.Udhayakumar 1, M. Jawahar 2, I.Ramasamy 3 PG Student, Dept. Of CSE,KSR Institute For Engineering
More informationData Security Using Reliable Re-Encryption in Unreliable Cloud
ISSN (Online): 2277-5420 www.ijcsn.org Data Security Using Reliable Re-Encryption in Unreliable Cloud 328 1 Ajinkya Adhau, 2 Payal Bobade, 3 Priyanka Zilpe, 4 Yashodhara Fulmali 1, 2, 3, 4 Student, Department
More informationKeyword Search over Shared Cloud Data without Secure Channel or Authority
Keyword Search over Shared Cloud Data without Secure Channel or Authority Yilun Wu, Jinshu Su, and Baochun Li College of Computer, National University of Defense Technology, Changsha, Hunan, China Department
More informationRanked Search over Encrypted Cloud Data using Multiple Keywords
Ranked Search over Encrypted Cloud Data using Multiple Keywords [1] Nita Elizabeth Samuel, [2] Revathi B. R, [3] Sangeetha.M, [4] SreelekshmySelvin, [5] Dileep.V.K [1][2][3][4] LBS Institute of Technology
More informationSECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK
International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao
More informationIMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,
More informationAttribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds M. Suriyapriya 1, A. Joicy 2 PG Scholar 1 Assistant Professor CSE Department 2 St.Joseph College of Engineering Sriperumbudur, Chennai-602105
More informationData defense in unpredictable Cloud Using Access Control and Access Time
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 12 December. 2013 PP.29-34 Data defense in unpredictable Cloud Using Access Control
More informationSharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
More informationAn Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730
More informationDecentralized Access Control Schemes for Data Storage on Cloud
Computer Science and Engineering 2016, 6(1): 1-6 DOI: 10.5923/j.computer.20160601.01 Decentralized Access Control Schemes for Data Storage on Cloud Shraddha V. Mokle *, Nuzhat F. Shaikh Department of Computer
More informationArnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu
More informationChallenges and Trends on Predicate Encryption A Better Searchable Encryption in Cloud
Challenges and rends on Predicate Encryption A Better Searchable Encryption in Cloud Liang Hu, Yuanmo Zhang, Hongtu Li, Yicheng Yu, Fangming Wu, and Jianfeng Chu Jilin University, Changchun 13001, China
More informationAn Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption
Bonfring International Journal of Research in Communication Engineering, Vol. 2, No. 3, September 2012 1 An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment
More informationSecret Sharing based on XOR for Efficient Data Recovery in Cloud
Secret Sharing based on XOR for Efficient Data Recovery in Cloud Computing Environment Su-Hyun Kim, Im-Yeong Lee, First Author Division of Computer Software Engineering, Soonchunhyang University, kimsh@sch.ac.kr
More informationASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA Mahammad Zennyfor Sulthana 1, Shaik Habeeba 2 1 M.Tech Student, Dept of CS
More informationA NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
More informationSecurity and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services
Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services Chun-Ta Li 1, Jau-Ji Shen 2,, and Chin-Wen Lee 2 1 Department of Information Management,
More informationNew Efficient Searchable Encryption Schemes from Bilinear Pairings
International Journal of Network Security, Vol.10, No.1, PP.25 31, Jan. 2010 25 New Efficient Searchable Encryption Schemes from Bilinear Pairings Chunxiang Gu and Yuefei Zhu (Corresponding author: Chunxiang
More informationKey Laboratory of Computer Networks and Information Security Xidian University, Xi an, P.R. China e-mail: xfchen@xidian.edu.cn
Computing and Informatics, Vol. 32, 2013, 723 738 EFFICIENT MULTI-USER KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING Jin Li Department of Computer Science, Guangzhou University Guangzhou, P.R.
More informationCP-ABE Based Encryption for Secured Cloud Storage Access
International Journal of Scientific & Engineering Research, Volume 3, Issue 9, September-2012 1 CP-ABE Based Encryption for Secured Cloud Storage Access B. Raja Sekhar,B. Sunil Kumar, L. Swathi Reddy,
More informationSecure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data
Secure Attribute Based Mechanism through Access cipher policy in Outsourced Cloud Data V.Abinaya PG Scholar Kalasalingam Institute of Technology Krishnankoil. V.Ramesh Assistant professor Kalasalingam
More informationDECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS
DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS Ankita N.Madde 1, Minal J. Joshi 2, Suchita Gutte 3, Sonal Asawa 4, # Prashant Jawalkar 5 1,2,3,4 UG Student, 5 Project Guide, Computer Dept.,
More informationA Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
More informationSecurity Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing
Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing S.Hemalatha, Dr.R.Manickachezian Ph.D Research Scholar, Department of Computer Science, N.G.M College, Pollachi,
More informationStrengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
More informationSecure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud
1 Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud Kan Yang Associate Member IEEE Xiaohua Jia Fellow IEEE Kui Ren Senior Member IEEE Abstract Due to the high volume
More informationProfessor Radha Poovendran EE Department, University of Washington, Seattle, WA & Professor Dawn Song EECS Department, University of California,
Professor Radha Poovendran EE Department, University of Washington, Seattle, WA & Professor Dawn Song EECS Department, University of California, Berkeley, CA 1 Summer School Objectives Exposure to current
More informationAttributed-based Access Control for Multi-Authority Systems in Cloud Storage
2012 32nd IEEE International Conference on Distributed Computing Systems Attributed-based Access Control for Multi-Authority Systems in Cloud Storage Kan Yang Department of Computer Science City University
More informationAn Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining
An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer
More informationSecure Data Sharing in Cloud Computing using Hybrid cloud
International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh
More informationKEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD
KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD C.Vinoth 1, G.R.Anantha Raman 2 1 Computer Science and Engineering,ACE Hosur(India) 2 Assistant Professor, Computer Science and Engineering,
More informationOutstanding Cloud Security Service For Modify Data Distribute In Cloud Method
Outstanding Cloud Security Service For Modify Data Distribute In Cloud Method A.Manikanta Sharma M.Tech Student Sri Vatsavai Krishnam Raju College of Engineering and Technology, Bhimavaram, AP. Abstract:
More informationHighly Secure Data Sharing in Cloud Storage using Key-Pair Cryptosystem
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,
More informationNEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA
THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Number 1/2013, pp. 72 77 NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA Laurenţiu BURDUŞEL Politehnica
More informationSECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
More informationDistributed Attribute Based Encryption for Patient Health Record Security under Clouds
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained
More informationSURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY
SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY 1 Kavya G, 2 K.S. Rajesh 1 P.G Scholar, Dept. of Computer Science & Engineering RajaRajeswari College of Engineering, Bangalore,
More informationImplementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage
Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage 1 A. MsVaishali Patil, 2 B. Prof. Archana Lomte Dept of Computer,BSIOTR, Pune ABSTRACT Cloud computing is speculated
More informationPrivacy in Encrypted Content Distribution Using Private Broadcast Encryption
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption Adam Barth 1, Dan Boneh 1, and Brent Waters 2 1 Stanford University, Stanford, CA 94305 {abarth, dabo}@cs.stanford.edu 2 SRI
More informationTowards Temporal Access Control in Cloud Computing
Towards Temporal Access Control in Cloud Computing Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, and Shanbiao Wang Peking University, Beijing, 18, China Arizona State University, Tempe, Arizona, 85281,
More informationEnabling Protection and Well-Organized MRSE over Encrypted Cloud Data Using CP-ABE
Enabling Protection and Well-Organized MRSE over Encrypted Cloud Data Using CP-ABE Revathy B.D #1, Tejaswini.B #2, Abstract By means of the new arrival of cloud computing, data proprietors are provoked
More informationOn the Limits of Anonymous Password Authentication
On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,
More informationSECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
More informationA Secure Model for Medical Data Sharing
International Journal of Database Theory and Application 45 A Secure Model for Medical Data Sharing Wong Kok Seng 1,1,Myung Ho Kim 1, Rosli Besar 2, Fazly Salleh 2 1 Department of Computer, Soongsil University,
More informationPrivacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, Email: {ncao, mingli,
More informationKeywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based
More informationStrengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography Liang Yan, Chunming Rong, and Gansen Zhao University of Stavanger, Norway {liang.yan,chunming.rong}@uis.no
More informationSearchable encryption
RESEARCH MASTER S DEGREE IN COMPUTER SCIENCE Searchable encryption BIBLIOGRAPHICAL STUDY 26 January 2012 Tarik Moataz INTERNSHIP at Alcatel-Lucent Bell Labs Supervisors Cuppens Frédéric, SFIIS LabSTICC
More informationInverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee Bing Wang Wei Song Wenjing Lou Y. Thomas Hou Virginia Polytechnic Institute and State University, Blacksburg,
More informationA Secure Index Management Scheme for Providing Data Sharing in Cloud Storage
J Inf Process Syst, Vol.9, No.2, June 2013 pissn 1976-913X eissn 2092-805X http://dx.doi.org/10.3745/jips.2013.9.2.287 A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage Sun-Ho
More informationOutsourcing the Decryption of ABE Ciphertexts
Outsourcing the Decryption of ABE Ciphertexts Matthew Green and Susan Hohenberger Johns Hopkins University Brent Waters UT Austin Background A problem Securing records in a data-sharing environment E.g.,
More informationHow To Ensure Data Integrity In Cloud Storage
Decentralized Admittance Power with Flexible Distributed Storage Integrity Auditing Mechanism I G.Thenmozhi, II Dr.S.Dhanalakshmi I M.Phil Full Time Research Scholar, Dept. of Computer Science II Head
More informationPrivacy Preservation and Secure Data Sharing in Cloud Storage
OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh
More informationAN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. Saranya17113@gmail.com Dr.S.Rajalakshmi, Associate Professor/CSE,
More informationQuery Services in Cost Efficient Cloud Using Query Analysis
Query Services in Cost Efficient Cloud Using Query Analysis VanthanaPriya.J 1, ArunKumar.B 2 PG Scholar, Department of CSE, Karpagam University, Coimbatore, Tamil nadu, India 1 Assistant Professor, Department
More informationHow To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)
JJT-029-2015 SEARCHABLE SYMMETRIC ENCRYPTION METHOD FOR ENCRYPTED DATA IN CLOUD P.Vidyasagar, R.Karthikeyan, Dr.C.Nalini M.Tech Student, Dept of CSE,Bharath University, Email.Id: vsagarp@rediffmail.com
More informationApplication Based Access Control on Cloud Networks for Data Security
Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,
More informationRfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India archanathange7575@gmail.com,
More informationEfficient Unlinkable Secret Handshakes for Anonymous Communications
보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique
More informationVerifiable Symmetric Searchable Encryption for Multiple Groups of Users
Verifiable Symmetric Searchable Encryption for Multiple Groups of Users Zachary A. Kissel and Jie Wang Department of Computer Science, University of Massachusetts Lowell, Lowell, MA, USA Abstract We present
More informationA Novel Type Of Public Key Encryption In Cloud Data Sharing
A Novel Type Of Public Key Encryption In Cloud Data Sharing K.AGALYA [1],P.UPPILIRAJA [2] Prist University,Kumbakonam Abstract Cloud storage is gaining popularity recently. In enterprise settings, we see
More informationImplementation of Data Sharing in Cloud Storage Using Data Deduplication
Implementation of Data Sharing in Cloud Storage Using Data Deduplication 1. M.JITHENDRA, 2. Dr. G.V.S.N.R.V. PRASAD M.S, Ph.D. 1. M.Tech, Department of CSE, Gudlavalleru Engineering College. 2. Professor
More informationA study on keyword searchable frameworks for efficient data utilization in cloud storage
A study on able frameworks for efficient data utilization in cloud storage Bhagyashree M V 1, Pushpalatha M N 2 1 Student, Dept. of ISE, M S Ramaiah institute of technology, Karnataka, India 2Asst. professor,
More informationMulti Layered Securing of Health Records using Public and Private Model in Cloud
pp 97 102 Krishi Sanskriti Publications http://www.krishisanskriti.org/acsit.html Multi Layered Securing of Health Records using Public and Private Model in Cloud Vijay J 1, Anitha C.L 2 1 P.G.Student,
More informationSecure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control
Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control Shivarathri Ravinder M. Tech Student, Dept. of CSE, CMR College of Engineering and Technology, Kandlakoya Village, Medchal
More informationFine-Grained Access Control System based on Outsourced Attribute-based Encryption
Fine-Grained Access Control System based on Outsourced Attribute-based Encryption Jin Li 1, Xiaofeng Chen 2, Jingwei Li 3, Chunfu Jia 3, Jianfeng Ma 4, Wenjing Lou 5 1 School of Computer Science and Educational
More informationSECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
More informationSecure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment
, pp.257-272 http://dx.doi.org/10.14257/ijsia.2014.8.1.24 Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment Sun-Ho Lee and Im-Yeong Lee 1 Department of Computer Software
More informationEFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
More informationDATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
More informationPrivacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing
Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing Yanzhi Ren, Yingying Chen, Jie Yang, Bin Xie 3 Department of ECE, Stevens Institute of Technology, Hoboken,
More informationPrivacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, Email: {ncao, mingli,
More informationA Novel Framework for Cloud Environment Using CPDP for Data Integrity and Security
A Novel Framework for Cloud Environment Using CPDP for Data Integrity and Security V. Narasimha Swamy 1, K. Raja Shekar Reddy 2 1.M. Tech (CSE)., Srinivasa Institute of Technology & Science, Kadapa, Andhra
More informationCLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH TRAITOR DETECTION
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH TRAITOR DETECTION Punya Peethambaran 1 and Dr. Jayasudha J. S. 2 1 Department of Computer Science and Engineering, SCT College
More informationDAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang Dept. of CS, City University of Hong Kong Dept. of CSE, University at Buffalo,
More informationPRIVACY PRESERVING OF HEALTH MONITORING SERVICES IN CLOUD
http:// PRIVACY PRESERVING OF HEALTH MONITORING SERVICES IN CLOUD Mrs. Ramya.R 1, Mrs. Shruthi.G 2 1 M. Tech. Student, 2 Assistant Professor, Department of CSE, Don Bosco Institute of Technology, Bangalore,
More informationSecure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI
Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai
More informationKeywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
More informationImplementation of Role Based Access Control on Encrypted Data in Hybrid Cloud
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:g.ganorkar7691@gmail.com Contact: 8600200142
More informationAssuring Integrity in Privacy Preserving Multikeyword Ranked Search over Encrypted Cloud Data
Assuring Integrity in Privacy Preserving Multikeyword Ranked Search over Encrypted Cloud Data CH. Keerthi prathyusha Department of Computer Science and Engineering, JNTUA College of Engineering, Anantapuramu,
More informationPatient Controlled Encryption: Ensuring Privacy of Electronic Medical Records
Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records Melissa Chase (MSR) Joint work with Josh Benaloh, Kristin Lauter, and Eric Horvitz Medical Records Traditionally, health providers
More informationSecure emergency medical architecture on the cloud using wireless sensor networks for emergency detection
Secure emergency medical architecture on the cloud using wireless sensor networks for emergency detection Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah and Yacine Challal {lounisah,ahadjidj,bouabdal,ychallal}@utc.fr
More information