A survey paper of data access privilege scheme in cloud storage server for user privacy problem

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-28 Number-4
Year of Publication : 2015
Authors : Smita Arjun Wagh, B.padmavathi
  10.14445/22312803/IJCTT-V28P140

MLA

Smita Arjun Wagh, B.padmavathi "A survey paper of data access privilege scheme in cloud storage server for user privacy problem". International Journal of Computer Trends and Technology (IJCTT) V28(4):203-206, October 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Cloud computing is a recent generation technology which efficiently support the client oriented services. Now days there are a number of applications which uses the cloud storage service for storing and accessing information. In such conditions the data owner management and privacy preservation cryptographic techniques are used frequently. We represented a privacy preserving access control scheme for data storage, which supports authentication and decentralized key management. As people are more concerned about their identity privacy these days, the identity privacy also needs to be protected before the cloud enters our service. Cloud computing system should be salient in the case of security in which some part of the system is compromised by attackers. AnonyControl to address to the data privacy, and the user identity privacy in existing access control schemes. Here we use the user revocation in users to activating and deactivating users. Revoked users are maintained in the revoke user list and make publicly available in the cloud. User revoke will decide which user should may in cloud storage server to access data or which will remove. The data access privilege will be depending upon misbehaviour of user in cloud server.

References
[1] Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 1, JANUARY 2015
[2] Securing Data Stored in Clouds Using Privacy Preserving Authenticated Access Control IJCSMC, Vol. 3, Issue. 4, April 2014, pg.1069–1074
[3] Melissa Chase. Multi-authority Attribute Based Encryption. In TCC, volume 4392 of LNCS, pages 515–534. Springer, 2007.
[4] A. Sahai and B. Waters. Fuzzy Identity Based Encryption. In Advances in Cryptology – Eurocrypt, volume 3494 of LNCS, pages 457–473. Springer, 2005.
[5] John Bethencourt, Amit Sahai, and Brent Waters. Ciphertext-Policy Attribute-Based Encryption. In IEEE Symposium on Security and Privacy, pages 321–334. IEEE Computer Society, 2007. Ciphertext- Policy Attribute-Based Encryption John Bethencourt Carnegie Mellon University This email address is being protected from spambots. You need JavaScript enabled to view it. , Amit Sahai UCLA This email address is being protected from spambots. You need JavaScript enabled to view it. , Brent Waters SRI International
[6] Ciphertext -Policy Attribute-Based Encryption: An Expressive, Ecient, and Provably Secure Realization Brent Waters University of Texas at Austin This email address is being protected from spambots. You need JavaScript enabled to view it.
[7] A Model For Secure Data Sharing Using Attribute Based EncryptionMs. Priti D. Wanmali Dr. D. G. HarkutIPASJ International Journal of Computer Science (IIJCS) Volume 3, Issue 5, May 2015
[8] C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou, ―Toward Secure and Dependable Storage Services in Cloud Computing, 2012. [9] S. Kamara and K. Lauter, ―Cryptographic Cloud Storage, Proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp. 136-149, Jan. 2010.
[10] EFFICIENT USER REVOCATION FOR DYNAMIC GROUPS IN THE CLOUD International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February,2014 Page No. 3938-3942
[11] D. Naor, M. Naor, and J.B.Lotspiech, ―Revocation and Tracing Schemes for Stateless Receivers, Proc. Ann. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 41-62, 2001.
[12] B. Waters, ―Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, Proc. Int’l Conf. Practice and Theory in Public Key Cryptography Conf. Public KeyCryptography, http://eprint.iacr.org/2008/290.pdf, 2008.
[13] Huang Lin, Zhenfu Cao, Xiaohui Liang, and Jun Shao. Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. In INDOCRYPT, volume 5365 of LNCS, pages 426– 436. Springer, 2008.
[14] CLOUD SECURITY USING FOG COMPUTING 1 SAYALI RAJE, 2NAMRATA PATIL, 3 SHITAL MUNDHE, 4RITIKA MAHAJAN [15] Ben-Salem M., and Stolfo, ―Decoy Document Deployment for Effective Masquerade Attack Detection, Computer Science Department, Columbia University, New York.
[16] Amit Sahai and Brent Waters. Fuzzy Identity-Based Encryption. In EUROCRYPT, volume 3494 of LNCS, pages 457–473. Springer, 2005.
[17] S. Yu, C. Wang, K. Ren, and W. Lou, ―Attribute based data sharing with attribute revocation, in Proc. 5th ACM Symp. Inf. Comput. Commun. Security (ASIACCS’10), 2010, pp. 261–270
[18] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-Policy Attribute- Based Encryption. In Proc. of SP’07, Washington, DC, USA, 2007.
[19] Raju Kadari , Janapati Venkata Krishna. "Securing Digital Forensics on Cloud Computing through Log based Accession". International Journal of Computer Trends and Technology (IJCTT) V16(2):81-84, Oct 2014. ISSN:2231-2803. Www.ijcttjournal.org. Published by Seventh Sense Research Group.
[20] V.Sathya Preiya, R.Pavithra , Dr. Joshi. "Secure Role based Data Access Control in Cloud Computing"International Journal of Computer Trends and Technology (IJCTT),V1(2):228-233 May to June Issue 2011 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Keywords
attribute based encryption, multiauthority , attribute based encryption, user revoke.