CFP last date
20 January 2025
Reseach Article

Highly Secure Method based on Ciphertext Policy Attribute based Encryption in Hadoop System

by Priyanka Rajput, Pankaj Kwadakar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 9
Year of Publication: 2014
Authors: Priyanka Rajput, Pankaj Kwadakar
10.5120/18105-9204

Priyanka Rajput, Pankaj Kwadakar . Highly Secure Method based on Ciphertext Policy Attribute based Encryption in Hadoop System. International Journal of Computer Applications. 103, 9 ( October 2014), 34-38. DOI=10.5120/18105-9204

@article{ 10.5120/18105-9204,
author = { Priyanka Rajput, Pankaj Kwadakar },
title = { Highly Secure Method based on Ciphertext Policy Attribute based Encryption in Hadoop System },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 9 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number9/18105-9204/ },
doi = { 10.5120/18105-9204 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:34:07.757840+05:30
%A Priyanka Rajput
%A Pankaj Kwadakar
%T Highly Secure Method based on Ciphertext Policy Attribute based Encryption in Hadoop System
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 9
%P 34-38
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. Cloud computing is set of resources and services offered through the Internet. The rapid growth in field of "cloud computing" also increases severe security concerns. Lack of security is the only hurdle in wide adoption of cloud computing. Distribution and sharing of File is one of the most critical service of cloud computing. This paper examines security for "big data" environments, reviewing built-in protections and weaknesses of these systems. In this paper, we use the Hadoop based file system and secure it using a highly secure algorithm based on ciphertext policy attributes based encryption with pairing (CP-ABE-WP with pairing). The solution aims at providing optimal performance in cloud environment and also ensures security by using a session based approach. The proposed method has maintained a hierarchy of users to ensure that files are used by their appropriate users.

References
  1. W. Zeng, Y. Zhao, K. Ou, and W. Song, "Research on cloud storage architecture and key technologies," in2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, 2009, pp. 1044–1048.
  2. X. Jing and Z. Jian-jun, "A brief survey on the security model of cloud computing," in Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science, 2010, pp. 475 – 478.
  3. R. Chandramouli and P. Mell, "State of security readiness," in Crossroads. ACM, 2010, pp. 23 – 25.
  4. Hadoop. http://hadoop. apache. org/, 2007.
  5. S. Ghemawat, H. Gobioff, and S. Leung. The Google file system. In ACM Symposium on Operating Systems Principles, 2003.
  6. M. C. Schatz. CloudBurst: highly sensitive read mapping with MapReduce. Bioinformatics, 25(11):1363– 1369, 2009.
  7. D. Borthakur. The hadoop distributed file system: Architecture and design. http://hadoop. apache. org/, 2007.
  8. A. Sahai and B. Waters, "Fuzzy identity based encryption," in Advances in Cryptology, vol. 3494 of LNCS. Springer, 2005, pp. 457 – 473.
  9. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in 13th ACM conference on Computer and communications security. ACM, 2006, pp. 89 – 98.
  10. R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in 14th ACM conference on computer and communications security. ACM, 2007, pp. 195 – 203.
  11. J. Bethen court, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in 2007 IEEE Symposium on Security and Privacy. IEEE Computer Society, 2007, pp. 321–334.
  12. V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," in ICALP, 2008, pp. 579 – 591.
  13. B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in IACR Cryptology ePrint Archive, no. 290, 2008.
  14. M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, "Secure attribute-based systems," in 13th ACM conference on computer and communications security, 2006, pp. 99 – 112.
  15. P. Junod and A. Karlov, "An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policy in Tenth annual ACM workshop on digital rights management. ACM, 2010, pp. 13–24.
  16. S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in ACM Symposium on Information, Computer and Communications Security, 2010, pp. 261 – 270.
  17. M. Blaze, G. Bleumer, and M. Strauss, "Divertable protocols and atomic proxy cryptography," in EUROCRYPT, vol. 1403 of LNCS. Springer, 1998, pp. 127–144.
  18. S. Jahid, P. Mittal, and N. Borisov, "Easier: Encryption-based access control in social networks with efficient revocation," in 6th ACM Symposium on Information Computer and Communications Security, 2011, pp. 411–415.
  19. J. Hur and D. K. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems," in IEEE Transactions on Parallel and Distributed Systems, vol. 22, 2011, pp. 1214 – 1221.
  20. Shuaishuai Zhu, Xiaoyuan Yang and XuGuang Wu, "Secure Cloud File System with Attribute based Encryptio," 2013 5th International Conference on Intelligent Networking and Collaborative System 2013 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Storage Access Control Attribute-Based Encryption Document Sharing Ciphertext-Policy.