Provide Privacy and Efficiency of Multi Authority Data Access Control Over Cloud Computing

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2015 by IJETT Journal
Volume-30 Number-5
Year of Publication : 2015
Authors : Bheri Thrinadha, Ramesh kumarBehara

Citation 

Bheri Thrinadha, Ramesh kumarBehara"Provide Privacy and Efficiency of Multi Authority Data Access Control Over Cloud Computing", International Journal of Engineering Trends and Technology (IJETT), V30(5),263-266 December 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Cloud storage is an important service of cloud computing, which offers services for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces a great challenge to data access control. So that we can access data before each user will perform the authentication process and also provide data access control policy. In this paper we are proposed mainly on authentication of users, group key generation, data access control policy, data encryption and decryption process. By implementing those concepts we can improve the efficiency of data access and also provide more security of hosting data in cloud.

 References

[1] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
[2] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. Int?l Conf. Financial Cryptography and Data Security (FC), pp. 136- 149, Jan. 2010.
[3] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing,” Proc. IEEE INFOCOM, pp. 534-542, 2010.
[4] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,” Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.
[5] E. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing Remote Untrusted Storage,” Proc. Network
[6] M. Chase, „„Multi-Authority Attribute Based Encryption,?? in Proc. 4th Theory of Cryptography Conf. Theory of Cryptography (TCC?07), 2007, pp. 515-534.
[7] M. Chase and S.S.M. Chow, „„Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,?? in Proc. 16th ACM Conf. Computer and Comm. Security (CCS?09), 2009, pp. 121-130.
[8] A.B. Lewko and B. Waters, „„Decentralizing Attribute-Based Encryption,?? in Proc. Advances in Cryptology-EUROCRYPT?11, 2011, pp. 568-588.
[9] S. Yu, C. Wang, K. Ren, and W. Lou, „„Attribute Based Data Sharing with Attribute Revocation,?? in Proc. 5th ACM Symp. Information, Computer and Comm. Security (ASIACCS?10), 2010, pp. 261-270.
[10] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, „„Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,?? IEEE Trans. Parallel Distributed Systems, vol. 24, no. 1, pp. 131-143, Jan. 2013.
[11] J. Hur and D.K. Noh, „„Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,?? IEEE Trans. Parallel Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011.

Keywords
In this paper we are proposed mainly on authentication of users, group key generation, data access control policy, data encryption and decryption process.