Attribute Based User Control Access for Cloud Storage Data

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-11 Number-5
Year of Publication : 2014
Authors : Satheesh Kavuri , GangadharaRao Kancharla , Basaveswara Rao Bobba
DOI :  10.14445/22312803/IJCTT-V11P141

MLA

Satheesh Kavuri , GangadharaRao Kancharla , Basaveswara Rao Bobba."Attribute Based User Control Access for Cloud Storage Data". International Journal of Computer Trends and Technology (IJCTT) V11(5):193-197, May 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Online documents provide very convenient ways for individuals to store and share various data including personal profile, business documents and etc on remote online data servers. Cloud Computing, regarded as the future IT architecture, and even promises to provide unlimited and elastic computing resources to cloud users in a very cost-effective way. Information security is basically a critical issue for remote data storage in cloud environment. On one side, disclosure of sensitive information, an example would be business records, stored on remote data servers ought to be strictly protected before users to utilize the data services. Traditional data access control mechanisms often should not set up appropriate security mechanism to sensitive data among multiple users. An untrusted storage cloud server is permitted to learn the content of sensitive data and doesn’t enforce data access policies. To maintain data confidential owner need to encrypt data before upload to the cloud. User access is granted by possessing the data decryption secret key. In this proposed approach an improved attribute based document encryption and decryption is provided for multiple users in cloud environment.

References
[1]. Ciphertext-Policy Attribute-Based Encryption John Bethencourt, Security and Privacy, 2007. SP `07. IEEE Symposium, 321 – 334,2007.
[2] Attribute Based Data Sharing with Attribute Revocation Shucheng Yu, Cong Wang. Proceeding ASIACCS `10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security Pages 261-270 ACM New York, NY, USA ©2010.
[3] A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments Cheng-Chi Lee , Pei-Shan Chung , and Min-Shiang Hwang, International Journal of Network Security, Vol.15, No.4, PP.231-240, July 2013.
[4] Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption, Ming Li, Jan. 2013 (vol. 24 no. 1) pp. 131-143.
[5] Security of PHR in Cloud Computing by Using Several Attribute Based Encryption Techniques Neetha Xavier, V.Chandrasekar, International Journal of Communication and Computer Technologies Volume 01 – No.72 Issue: 07 Nov 2013 ISSN NUMBER : 2278-9723 .
[6] Scalable Access Control in Cloud Computing Using Hierarchical Attribute Set Based Encryption (HASBE) A.Vishnukumar, G.Muruga Boopathi, S.Sabareessh, International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319–6378, Volume-1, Issue-4, February 2013
[7] Rakesh Bobba, Himanshu Khurana and Manoj Prabhakaran, “AttributeSets: A Practically Motivated Enhancement to Attribute-Based Encryption”, July 27, 2009
[8] R. Ostrovsky and B. Waters. “Attribute based encryption with nonmonotonic access structures”.In Proceedings of the 14th ACM conference on Computer and communications security, pages 195{203. ACM New York, NY, USA,2007.
[9] K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, A ciphertext-policy attribute-based encryption scheme with constant ciphertext length," in Proceedings of the Information Security Practice and Experience, pp. 13{23, 2009.
[10] V. Goyal, A. Jain, O. Pandey, and A. Sahai, Bounded ciphertext policy attribute based encryption," in Proceedings of the ICALP, pp. 579{591, 2008.

Keywords
Attribute based Encryption, Cloud server, Amazon aws, Access policies.