CFP last date
20 December 2024
Reseach Article

A Secure Data Storage over Cloud using ABE (Attribute based Encryption) Approach

by Avinash Shukla, Sanjay Silakari, Uday Chourasia
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 9
Year of Publication: 2017
Authors: Avinash Shukla, Sanjay Silakari, Uday Chourasia
10.5120/ijca2017914509

Avinash Shukla, Sanjay Silakari, Uday Chourasia . A Secure Data Storage over Cloud using ABE (Attribute based Encryption) Approach. International Journal of Computer Applications. 168, 9 ( Jun 2017), 45-48. DOI=10.5120/ijca2017914509

@article{ 10.5120/ijca2017914509,
author = { Avinash Shukla, Sanjay Silakari, Uday Chourasia },
title = { A Secure Data Storage over Cloud using ABE (Attribute based Encryption) Approach },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 9 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 45-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number9/27905-2017914509/ },
doi = { 10.5120/ijca2017914509 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:15:42.802531+05:30
%A Avinash Shukla
%A Sanjay Silakari
%A Uday Chourasia
%T A Secure Data Storage over Cloud using ABE (Attribute based Encryption) Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 9
%P 45-48
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing technology, its component and various storage strategies is emerging today. All Industries are moving towards cloud due to its fast and scalable in nature. Further a data sharing is possible in between the organization or in group of people. There is technique which uses encryption technique, data access control or verification of users data. Cloud computing technique emerges in its own technique to provide best effort and reliability to the user. Existing approaches used different key generation model for data storage. In this paper an enhance session creation technique is used which is providing the security assurance to the user. The experiment performed with both existing and proposed approach over user data upload. It is further observed that the proposed work outperform data access with less computation time and cost. It can further be used for real-time application without security compromise , as well as in mobile computing.

References
  1. Tiantian LIU, Tongkai JI, Qiang YUE, Zhenchu TANG “G-Cloud: A Highly Reliable and Secure IaaS Platform” IEEE, 2015.
  2. Kadam Prasad,Jadhav Poonam,Khupase Gauri, N. C. Thoutam “Data Sharing Security and Privacy Preservation in Cloud Computing” IEEE, 2015.
  3. N. Shanmugakani, R. Chinna “An Explicit Integrity Verification Scheme for cloud Distributed systems” ICSO, IEEE, 2015.
  4. Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol “an Efficient Id based Message Recoverable Privacy Preserving Auditing schme” PST, IEEE 2015.
  5. Nivedita Simbre, Priya Deshpandey “Enhancing Distributed Data Storage security for cloud computing using TPA and AES algorithm” IEEE, 2015.
  6. Naithik Shah, NisargDesai,ViralVashi,” Efficient Cryptography for Data Security”,2014 International Conference on Computing for Sustainable Global Development (INDIACom).
  7. M. Yamuna, S. Ravi Rohith, Pramodh Mazumdar, Avani Gupta ”Text Encryption Using Matrices ”, International Journal of Application or Innovation in Engineering & Management (IJAIEM)Volume 2, Issue 3, March 2013.
  8. Devendra Prasad,Govind Prasad Arya, Chirag Chaudhary, Vipin Kumar, “A Text Encryption and Decryption Technique Using Substitution-Transposition and Basic Arithmetic and Logic Operation ”,International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014.
  9. Udepal Singh, UpasnaGarg,” An ASCII value based text data encryption System”, International Journal of Scientific and Research Publications, Volume 3, Issue 11, November 2013 1 ISSN 2250-3153.
  10. Charru, Paramjeet Singh, Shaveta Rani “Efficient Text Data Encryption System to Optimize Execution Time and Data Security”International Journal of Advanced Research in Computer Science and Software Engineering(IJARCSSE), Volume4,Issue7,July2014.
  11. J. Gitanjali, Dr. N. Jeyanthi, C. Ranichandra, M. Pounambal, “ASCII Based Cryptography Using Unique ID, Matrix Multiplication and Palindrome Number”, The International symposium on Networks, Computers and Communications, IEEE, 2014.
  12. Cloud Security Alliance. (2009) Security guidance for critical areas of focus in cloud computing V2.1. http://www.cloudsecurityalliance.org/guidance/csaguide.v2.1.pdf
  13. M. Jensen. et. al. (2009) “On Technical Security Issues in Cloud Computing” IEEE International Conference in Cloud Conouting, pp.109-116, Sep 2009.
  14. M. McIntosh and P. Austel. “XML Signature Element Wrapping Attack and CounterMeasures” Workshop on Secure Web Service, pp.20-27, 2005.
  15. S. Subashini, ,Kavitha,V."A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. In Press, Corrected Proof.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud security data encryption auditing approach virtualization and data access.