420 research outputs found

    Anonymous Authentication of Decentralized Access Control of Data Stored in Cloud

    Get PDF
    Cloud computing is location that allows users to store the data. Cloud computing is logically developed technology to store data from more than one user. In decentralized access control data is stored securely in cloud and here only valid users are able to decrypt the data stored in cloud and this is added feature of this scheme. This scheme supports anonymous authentication. It also supports construction, variation and reading data stored in cloud and also deals with user revocation. This access control scheme is decentralized and robust which is different from other access control scheme and costs are equivalent to centralized approaches. DOI: 10.17762/ijritcc2321-8169.16049

    A Cryptographic Solution to the Predefind Bound of Ciphertext Classes in KAC

    Get PDF
    In Cloud Computingsecure data sharing is an important functionality. Cloud computing is the storing of data online which is accessible from multiple and connected resources. It is the fastest growing field in computer world which serves various services to users. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services. This paper attempts to show how data is shared among cloud users securely, efficiently, and flexibly. On cloud anyone can share data as much they want to i.e. only selected content can be shared. With cryptography users can share the data to others in safe way. So that user encrypts data and upload it on cloud server. The proposed algorithm uses a new cryptosystem that is called as Key Aggregate Cryptosystem (KAC)[1] which generates a single key for multiple files. In particular, it uses a public key encryption which releases aggregate key for set of secret keys. With this aggregate key others can decrypt ciphertext set and remaining encrypted files outside the set are remains confidential

    Overview of Cloud Computing Storage System

    Get PDF
    Now a days their is main issue related to data that the data should be safe or secure so that no one can make changes in our personal or important data .This System includes Cloud Storage System, which is a paid facility which benefits the Data Owner to outsource its data on the cloud and data owner can perform dynamic operations on the stored data. Data owner has rights to select the authorized user .The dishonest party can be easily detected and data owner will get the alerts .All the authorized user will get the modified data from the data owner. Only data owner has rights to modify, insert, delete etc, and all updated copies are given by data owner to the authorized user. DOI: 10.17762/ijritcc2321-8169.15013

    Development of Novel Encryption for Secured Data Sharing

    Full text link
    In cloud storage the data sharing is important one. Key-aggregate cryptosystem produce constant size cipher text . That is very efficient delegation rights of decryption for any set of cipher text are possible. Any set of secret keys can be aggregated and make them as single key, which groups all the key by making it a aggregate key. This aggregate key can be sent to the others for decryption of cipher text set and remaining .Encrypted files outside the set are remains confidential. Cloud storage could provide secured data sharin

    Remarks on the Cryptographic Primitive of Attribute-based Encryption

    Get PDF
    Attribute-based encryption (ABE) which allows users to encrypt and decrypt messages based on user attributes is a type of one-to-many encryption. Unlike the conventional one-to-one encryption which has no intention to exclude any partners of the intended receiver from obtaining the plaintext, an ABE system tries to exclude some unintended recipients from obtaining the plaintext whether they are partners of some intended recipients. We remark that this requirement for ABE is very hard to meet. An ABE system cannot truly exclude some unintended recipients from decryption because some users can exchange their decryption keys in order to maximize their own interests. The flaw discounts the importance of the cryptographic primitive.Comment: 9 pages, 4 figure

    PRIVACY PRESERVING POLICY UPDATE FOR BIG DATA ACCESS CONTROL IN THE CLOUD COMPUTING

    Get PDF
    Big data majorly associated with  the high volume and velocity , it is an effective option to store big data in the cloud, as the cloud has capabilities of storing big data and processing high volume of user access requests. Attribute-Based Encryption (ABE) is a promising technique to ensure the end-to-end security of big data in the cloud. However, the policy updating has always been a challenging issue when ABE is used to construct access control schemes. A trivial implementation is to let data owners retrieve the data and re-encrypt it under the new access policy, and then send it back to the cloud. This method, however, incurs a high communication overhead and heavy computation burden on data owners. A novel scheme is proposed that enable efficient access control with dynamic policy updating for big data in the cloud. Developing an outsourced policy updating method for ABE systems is focused. This method can avoid the transmission of encrypted data and minimize the computation work of data owners, by making use of the previously encrypted data with old access policies. Policy updating algorithms is proposed for different types of access policies. An efficient and secure method is proposed that allows data owner to check whether the cloud server has updated the ciphertexts correctly. The analysis shows that this policy updating outsourcing scheme is correct, complete, secure and efficient
    • …
    corecore