CFP last date
20 December 2024
Reseach Article

Fastest Access of Secured Data in Cloud storage by using Attribute-based Encryption

by Ramiz Shaikh, Ankit Dongre
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 1
Year of Publication: 2015
Authors: Ramiz Shaikh, Ankit Dongre
10.5120/ijca2015906310

Ramiz Shaikh, Ankit Dongre . Fastest Access of Secured Data in Cloud storage by using Attribute-based Encryption. International Journal of Computer Applications. 127, 1 ( October 2015), 17-20. DOI=10.5120/ijca2015906310

@article{ 10.5120/ijca2015906310,
author = { Ramiz Shaikh, Ankit Dongre },
title = { Fastest Access of Secured Data in Cloud storage by using Attribute-based Encryption },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 1 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 17-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume127/number1/22693-2015906310/ },
doi = { 10.5120/ijca2015906310 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:18:44.106442+05:30
%A Ramiz Shaikh
%A Ankit Dongre
%T Fastest Access of Secured Data in Cloud storage by using Attribute-based Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 1
%P 17-20
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud security is the most critical task while considering its working environment, i.e. outsourced, distributed and utility based. In such cases making the users data confidential, increases the trust over the system. Also the security procedure does not make the availability affected in any ways. The users of these kind of systems is always retained the services and securities preliminaries with respect to the data itself. As the cloud user can access its data frequently and if here some encryption is used which requires decryption and the repetitive process continues to increase the overheads. It requires some mechanism in which encryption is performed and if the user requires to perform some operations on secure file without decrypting it can be fulfilled. Thus homomorphic encryption lets the user facilitates about the performing operations on encrypted data which reduces the complexity of confidentiality operations. Also to prevent Cloud Servers from being able to learn both the data file contents and user access privilege information used to generate key along with the fastest access of secured data by using Attribute-based encryption (ABE).

References
  1. Shucheng Yu, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing”, in Proceedings of IEEE Infocomm, ISSN: 978-1-4244-5837-0/10, 2010.
  2. Srijith“Towards Secure Cloud Bursting,Brokerage and Aggregation” 2010 Eighth IEEE European conference on web services
  3. Cong Wang, Student Member, IEEE, Sherman S.-M. Chow, Qian Wang, Student Member, IEEE,KuiRen, Member, IEEE, and Wenjing Lou, Member, IEEE “Privacy-Preserving Public Auditing for Secure Cloud Storage, IEEE-2012
  4. Cong Wang1, Qian Wang1, Kui Ren1, and Wenjing Lou2,” Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, IEEE INFOCOM 2010, San Diego, CA, March 2010
  5. Ms. Vaishnavi Moorthy1, Dr. S. Sivasubramaniam2,” Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing, IOSR Journal of EngineeringMar. 2012, Vol. 2(3) pp: 496-500
  6. C. Hota, S. Sanka, M. Rajarajan, S. Nair, "Capability-based Cryptographic Data Access Control in Cloud Computing", in International Journal of Advanced Networking and Applications, Volume 01, Issue 01, 2011.
  7. Rosario Gennaro and Daniel Wichs, Fully Homomorphic Message Authenticators IBM Research, T.J. Watson, May 23, 2012
  8. K. Kajendran, J. Jeyaseelan, J. Joshi, “An Approach for secures Data storage using Cloud Computing” In International Journal of Computer Trends and Technology- May to June Issue 2011
  9. W. Luo, G. Bai, “Ensuring the Data Integrity In Cloud computing” In Proceedings of IEEE CCIS, 2011.
  10. S. Sanka, C. Hota, and M. Rajarajan, “Secure data access in cloud computing,” in 2010 IEEE 4th International http://en.wikipedia.org/wiki
  11. H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp. 90–107.
  12. Dianli GUO and Fengtong WEN, “A More Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment”, in Journal of Computational Information Systems, ISSN; 1553–9105, Vol. 9:No. 2, 2013, 407-413
  13. Kristin Lauter, Michael NaehrigandVinodVaikuntanathan, “Can Homomorphic Encryption be Practical”, in ACM, 2008.
  14. Craig Gentry, “Computing Arbitrary Functions of Encrypted Data”, in ACM by IBM T.J. Watson Research Center, 2008.
  15. Bharath K. Samanthula, Gerry Howser, Yousef Elmehdwi, and Sanjay Madria, “An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud”, in Cloud 1st conference by ACM, ISSN: 978-1-4503, DOI: 1596-8/12/08, 2012.
  16. Robert Griffin and SubhashSankuratripati, “Key Management Interoperability Protocol Profile Version 1.1”, in OASIS Standards Organizations at http://docs.oasis-open.org/kmip/profiles/v1.1/os/kmip-profiles-v1.1-os.doc, 2013.
  17. Web Article, “Amazon Web Services: Overview of Security Processes” by Amazon Services at http://aws.amazon.com/security,June 2013.
  18. K. Raen, C. Wang, Q. Wang, “Security Challenges for the Public Cloud”, Published by IEEE Computer Society, Jan/Feb 2012
  19. J.-P. Aumasson, L. Henzen, W. Meier, and R. Phan, “SHA-3 proposal BLAKE,” December 2010.
  20. GALS System Design: Side Channel Attack Secure Cryptographic Accelerators
  21. AES encryption and decryption http://www.iis.ee.ethz.ch/~kgf/acacia/c3.html
  22. Kamara, S., Lauter, K.: “Cryptographic cloud storage”. In: Proceedings of the 14th international conference on Financial cryptography and data security, FC'10, pp. 136-149. Springer-Verlag, Berlin, Heidelberg (2010)
Index Terms

Computer Science
Information Sciences

Keywords

Attribute Based Encryption Cloud Storage Data Storage Holomorphic.