93 research outputs found

    Attribute-based encryption for cloud computing access control: A survey

    Get PDF
    National Research Foundation (NRF) Singapore; AXA Research Fun

    Data Access in Multiauthority Cloud Storage: Expressive and Revocable Data Control System

    Get PDF
    ABSTRACT Cloud computing is rising enormously due to its advantages and the adaptable storage services being provided by it. Because of this, the number of users has reached the top level. The users will share the sensitive data through the cloud. Furthermore, the user can\u27t trust the untrusted cloud server. Subsequently, the data access control has turned out to be extremely challenging in cloud storage framework. In existing work, revocable data access control scheme proposed for multi-authority cloud storage frameworks which supports the access control in light of the authority control. The authorized users who have desirable attributes given by various authorities can access the data. However, it couldn\u27t control the attacks which can happen to the authorized user who is not having desirable attributes. In this work, they propose a new algorithm named Improved Security Data Access Control which beats the issue exists in the existing work. And furthermore, incorporates the efficient attribute revocation strategy for multi-authority cloud storage. Keywords: Access control, multi-authority, attribute revocation, cloud storage

    Robust, Revocable and Adaptively Secure Attribute-Based Encryption with Outsourced Decryption

    Get PDF
    Attribute based encryption (ABE) is a cryptographic technique allowing fine-grained access control by enabling one-to-many encryption. Existing ABE constructions suffer from at least one of the following limitations. First, single point of failure on security meaning that, once an authority is compromised, an adversary can either easily break the confidentiality of the encrypted data or effortlessly prevent legitimate users from accessing data; second, the lack of user and/or attribute revocation mechanism achieving forward secrecy; third, a heavy computation workload is placed on data user; last but not least, the lack of adaptive security in standard models. In this paper, we propose the first single-point-of-failure free multi-authority ciphertext-policy ABE that simultaneously (1) ensures robustness for both decryption key issuing and access revocation while achieving forward secrecy; (2) enables outsourced decryption to reduce the decryption overhead for data users that have limited computational resources; and (3) achieves adaptive (full) security in standard models. The provided theoretical complexity comparison shows that our construction introduces linear storage and computation overheads that occurs only once during its setup phase, which we believe to be a reasonable price to pay to achieve all previous features

    An Enhanced Efficient User Revocation Mechanism on Top of Anonymous ABE

    Get PDF
    Now days there are a number of applications which uses the cloud storage service for storing and accessing information. In such conditions the data owner management and privacy preservation cryptographic techniques are used frequently. We spoke to a protection safeguarding access control plot for information stockpiling, which underpins validation and decentralized key administration. AnonyControl to deliver to the information security, and the client character protection in existing access control plans. Here we utilize the client disavowal in clients to actuating and deactivating clients. Renounced clients are kept up in the disavow client rundown and make openly accessible in the cloud. Client deny will choose which client ought to may in distributed storage server to get to information or which will expel. The information get to benefit will rely on rowdiness of client in cloud server. Characteristic based Encryption (ABE) procedure is viewed as a most dependable cryptographic leading instrument to ensure information proprietor's immediate control on their information out in the open distributed storage. The past ABE plans include one and only power to keep up the total property set, which can bring a solitary point block on both security and execution. Paper proposed the outline, an expressive, proficient and revocable decentralized way information get to control plot for multi-power distributed storage frameworks

    Data auditing and security in cloud computing: issues, challenges and future directions

    Get PDF
    Cloud computing is one of the significant development that utilizes progressive computational power and upgrades data distribution and data storing facilities. With cloud information services, it is essential for information to be saved in the cloud and also distributed across numerous customers. Cloud information repository is involved with issues of information integrity, data security and information access by unapproved users. Hence, an autonomous reviewing and auditing facility is necessary to guarantee that the information is effectively accommodated and used in the cloud. In this paper, a comprehensive survey on the state-of-art techniques in data auditing and security are discussed. Challenging problems in information repository auditing and security are presented. Finally, directions for future research in data auditing and security have been discusse

    Data Auditing and Security in Cloud Computing: Issues, Challenges and Future Directions

    Get PDF
    Cloud computing is one of the significant development that utilizes progressive computational power and upgrades data distribution and data storing facilities. With cloud information services, it is essential for information to be saved in the cloud and also distributed across numerous customers. Cloud information repository is involved with issues of information integrity, data security and information access by unapproved users. Hence, an autonomous reviewing and auditing facility is necessary to guarantee that the information is effectively accommodated and used in the cloud. In this paper, a comprehensive survey on the state-of-art techniques in data auditing and security are discussed. Challenging problems in information repository auditing and security are presented. Finally, directions for future research in data auditing and security have been discussed

    Data Possession Schemes with Reviving Authenticated Security in Cloud Computing

    Get PDF
    Cloud computing gives adaptable data to the administrators and ever-present data annoy. Be that as it may, the vault services gave by cloud server isn't trusted by clients. The data's given by cloud server can be effectively taken by interlopers. Accessible encryption could give the elements of confidentiality insurance and protection safeguarding data recovery, which is a significant instrument for secure storage. In this paper, we propose a productive huge universe normal language look plot for the cloud storage, which protection is saving and secure against the disconnected watchword speculating assault (KGA). An outstanding feature of the proposition over other existing schemes is that it bolsters the customary language encryption and deterministic limited automata (DFA) based data recovery. The huge universe development guarantees the extendibility of the framework, wherein the image set shouldn't be predefined. Different clients are bolstered in the framework, and the client could produce a DFA token utilizing his own private key without connecting with the key age focus. Moreover, the solid plan is productive and officially demonstrated secure in standard model. Broad correlation and reenactment show that this plan has capacity and execution prevalent than different schemes

    Data storage security and privacy in cloud computing: A comprehensive survey

    Get PDF
    Cloud Computing is a form of distributed computing wherein resources and application platforms are distributed over the Internet through on demand and pay on utilization basis. Data Storage is main feature that cloud data centres are provided to the companies/organizations to preserve huge data. But still few organizations are not ready to use cloud technology due to lack of security. This paper describes the different techniques along with few security challenges, advantages and also disadvantages. It also provides the analysis of data security issues and privacy protection affairs related to cloud computing by preventing data access from unauthorized users, managing sensitive data, providing accuracy and consistency of data store
    corecore