1,022 research outputs found

    ACAFD: Secure and Scalable Access Control with Assured File Deletion for Outsourced Data in Cloud

    Get PDF
    Cloud storage has emerged as a popular paradigm to outsource data to third party and share it with the collaborators. While this new paradigm enables users to outsource their sensitive data and reduces data management costs, it brings forth the new challenges to the user to keep their data secure. Data storage security and access control in the cloud is one of the challenging ongoing research works to alleviate the data leakage problem from unauthorized users. Existing solutions that use pure cryptographic techniques suffers from heavy computation work with respect to key management and key distribution.  Attribute based encryption is an alternative solution that map the user access structure with the data file attributes to control the data access. However any of the existing schemes doesn't address the access control with assured deletion of the files upon revocation of user access. This article addresses this open issue using a trusted authority that manages the access control list and takes care of key management and key distribution and file deletion upon user revocation. The prototype of model has been presented and analyzed the security features over existing scheme

    Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach

    Get PDF
    Cloud computing allows shared computer and storage facilities to be used by a multitude of clients. While cloud management is centralized, the information resides in the cloud and information sharing can be implemented via off-the-shelf techniques for multiuser databases. Users, however, are very diffident for not having full control over their sensitive data. Untrusted database-as-a-server techniques are neither readily extendable to the cloud environment nor easily understandable by non-technical users. To solve this problem, we present an approach where agents share reserved data in a secure manner by the use of simple grant-and-revoke permissions on shared data.Comment: 7 pages, 9 figures, Cloud Computing 201

    Decentralized Anonymous User Authentication For Securing Data Storage in Cloud

    Get PDF
    The main objective of system is secure data storage on clouds. Cloud checks the authentication of the user without knowing the user’s identity. For encryption use Attribute Base Encryption algorithm (ABE) in which encryption is takes place and also set access policies. Decryption is only possible for valid users in Access control policy. System prevents replay attacks because of Attribute Base Signature algorithm (ABS) and provides the facilities for creation, modification, and reading data stored in the cloud. This scheme provides facility for user revocation by that user cannot access the data. Therefore, emphasize that cloud should take a decentralized approach which is robust instead of using access control schemes designed for clouds which are centralized. In this scheme there is one limitation is that the cloud already know the access policy for each record or user stored in the cloud. In future, system can also hide the attributes and access policy of a user. DOI: 10.17762/ijritcc2321-8169.15010
    • …
    corecore