7,344 research outputs found

    Secure Cloud Storage using Multi Attribute Authority with Multi Central Authority

    Get PDF
    Cloud Computing plays a main role in present day to day life. Security & privacy of data is major task in cloud. It is required to protect data from hackers & introdures . To provide more security this paper present multi attribute authority Cipher text Attribute Based Encryption (CPABE )technology with multi Central Authority(CA). Due to untrusted cloud server data access control becomes challenging task in cloud computing. Current data access control scheme is no longer applicable to cloud storage system, because it can’t provide fully trusted cloud server. We call it as a central authority. This single CA did not manage any attribute but responsible for issuing user unique id (UID).This CA must have capacity to decrypt any Cipher Text(CT) on the cloud. To overcome such a drawback here we can replace single CA to multi CA.in this paper we design secure cloud storage by providing access to the files using CPABE scheme. This system achieve forwarded & backward security . Also in this paper revocation technique is used related with file,user and attribute. DOI: 10.17762/ijritcc2321-8169.16041

    UNDETERMINED CIPHER LANGUAGE PROGRAMMING AND IMPLEMENTATION OF ITS APPLICATION

    Get PDF
    We advise impressive anti-collusion circuit clubpenguin-abe construction within this paper because clubpenguin-abe is conceptually nearer to sensational standard get entry to with-holding methods. There are two complementary types of attribute-based file encryption. Powerful first is key-policy attribute-based file encryption, and yet another is ciphertext-policy attribute-based file encryption. Additionally, guess that melodramatic symmetric cipher is 128-bit. Sudden bandwidth from spectacular transmitted ciphertext for that data owner grows using impressive increase from electrifying depths of circuit. For delegation computation, suspenseful servers could be employed to handle and calculate numerous data based on impressive user’s demands. As tense untrusted cloud servers who are able to translate suspenseful initial ciphertext right into a simple you could learn nothing concerning histrionic plaintext in electrifying delegation. Electrifying expense from melodramatic computation and communication consumption reveals that powerful plan is sensible within tense cloud-computing. thus, we're able to put it on make sure spectacular data confidentiality, electrifying fine grained get right of entry to self-discipline and likewise electrifying verifiable delegation in cloud. Throughout tense delegation increasing, a person could validate if sudden cloud server responds a proper transformed ciphertext to assist him/her decrypt electrifying ciphertext immediately and properly. Since insurance policy for general circuits enables to offer suspenseful most powerful type of inlet keep an eye on, a building for realizing circuit ciphertext-policy attribute-based hybrid file encryption with verifiable delegation continues to be considered within our work. In this system, coupled with verifiable computation and secure-then-mac mechanism, tense information confidentiality, sudden rare get admission to hinder and likewise tense decorousness from impressive indirect accruing answers are completely approved collectively

    A PERSONALIZED HIERARCHICAL QUALITY-BASED CIPHER TEXT CONTACT CONTROL PROCESS FOR MOBILE CLOUD COMPUTING

    Get PDF
    The issues of understanding storing and understanding computing in mobile-Internet applications may be overcome by mobile cloud-computing since the new paradigm may also accomplish cloud based multi-user data discussing, finish geographical service limitation, and process real-time tasks efficiently concurrently. With integrating into cloud-computing, security issues for example data confidentiality and user authority may arise within the mobile cloud-computing system, that's concerned because the primary constraints for the developments of mobile cloud-computing. To be able to provide secure operation, a hierarchical access control method using modified hierarchical attribute-based file encryption along with a modified three-layer structure is suggested within this paper. Within this paper, a hierarchical access control method through an altered hierarchical attribute-based file encryption along with a modified three-layer structure is suggested. The ABE based access control method uses several tags to mark the attributes the particular approved user must possess. Within the specific mobile cloud-computing model, enormous data which can be from numerous cell phones, for example smartphones, functioned phones and PDAs and so forth may be controlled and monitored while using the system, combined with data may be conscious to unauthorized 3rd party and constraint to legal users too

    AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption

    Full text link
    Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. To deal with security problems, various schemes based on the Attribute- Based Encryption (ABE) have been proposed recently. However, the privacy problem of cloud computing is yet to be solved. This paper presents an anonymous privilege control scheme AnonyControl to address the user and data privacy problem in a cloud. By using multiple authorities in cloud computing system, our proposed scheme achieves anonymous cloud data access, finegrained privilege control, and more importantly, tolerance to up to (N -2) authority compromise. Our security and performance analysis show that AnonyControl is both secure and efficient for cloud computing environment.Comment: 9 pages, 6 figures, 3 tables, conference, IEEE INFOCOM 201

    Achieving Privacy-Preserving DSSE for Intelligent IoT Healthcare System

    Get PDF
    As the product of combining Internet of Things (IoT), cloud computing, and traditional healthcare, Intelligent IoT Healthcare (IIoTH) brings us a lot of convenience, meanwhile security and privacy issues have attracted great attention. Dynamic searchable symmetric encryption (DSSE) technique can make the user search the dynamic healthcare information from IIoTH system under the condition that the privacy is protected. In this article, a novel privacy-preserving DSSE scheme for IIoTH system is proposed. It is the first DSSE scheme designed for personal health record (PHR) files database with forward security. We construct the secure index based on hash chain and realize trapdoor updates for resisting file injection attacks. In addition, we realize fine-grained search over encrypted PHR files database of attribute-value type. When the user executes search operations, he/she gets only a matched attribute value instead of the whole file. As a result, the communication cost is reduced and the disclosure of patient's privacy is minimized. The proposed scheme also achieves attribute access control, which allows users have different access authorities to attribute values. The specific security analysis and experiments show the security and the efficiency of the proposed scheme
    • …
    corecore