CFP last date
20 January 2025
Reseach Article

Trust based Security Service Mechanism for Client End Security using Attribute based Encryption at Cloud Platform

by Balwant Prajapat, Surendra Vishwakarma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 10
Year of Publication: 2013
Authors: Balwant Prajapat, Surendra Vishwakarma
10.5120/13777-1648

Balwant Prajapat, Surendra Vishwakarma . Trust based Security Service Mechanism for Client End Security using Attribute based Encryption at Cloud Platform. International Journal of Computer Applications. 79, 10 ( October 2013), 20-25. DOI=10.5120/13777-1648

@article{ 10.5120/13777-1648,
author = { Balwant Prajapat, Surendra Vishwakarma },
title = { Trust based Security Service Mechanism for Client End Security using Attribute based Encryption at Cloud Platform },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 10 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 20-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number10/13777-1648/ },
doi = { 10.5120/13777-1648 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:39.603573+05:30
%A Balwant Prajapat
%A Surendra Vishwakarma
%T Trust based Security Service Mechanism for Client End Security using Attribute based Encryption at Cloud Platform
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 10
%P 20-25
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet and cloud application is getting faster day by day. It increases the data exchange rate over internet. During this heavy data transmission security is considered as major issues in communication. Encryption method used as a primary technique for providing the security to information systems. Among all the encryption techniques attribute based encryption (ABE) is getting popularity among the users. For secure data access the client must be sure about the process used for this type of encryption but in cloud platform everything is provided by cloud. Thus the satisfaction of security at user level is not provided by any cloud. Thus this work proposes a novel Client end trust based security service mechanism (TBSSM) using behaviour based encryption for achieving the better results. This work focuses on the application area of cloud storage platform for user satisfaction. This model gives a unique stack based solution for achieving the end user security. In this methodology the attribute can be identified from the user attribute table. This attribute table is dynamic in nature & whose values are passed in the table after a pre calculation of trust & user modelling.

References
  1. Ming Li, Shucheng Yu, Yao Zheng, Student, Kui Ren, & Wenjing Lou, "Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption" in IEEE Transactions on Parallel & Distributed systems, 2012.
  2. Pratap Chandra Mandal, "Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish" in JGRCS, Volume 3, No. 8, August 2012.
  3. Deepak Garg, Limin Jia & Anupam Datta "Policy Auditing over Incomplete Logs: Theory, Implementation and Applications" in ACM 978-1-4503-0948-6/11/10 in 2011.
  4. Yanlin Li, Jonathan M. McCune, and Adrian Perrig, "VIPER: Verifying the Integrity of PERipherals' Firmware" in ACM 978-1-4503-0948-6/11/10 in 2011.
  5. Eric Y. Chen, Jason Bau & Charles Reis "App Isolation: Get the Security of Multiple Browsers with Just One" in ACM 978-1-4503-0948-6/11/10 in 2011.
  6. Jiyong Jang , David Brumley & Shobha Venkataraman in " BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis" in ACM 978-1-4503-0948-6/11/10 in 2011.
  7. Vishwa gupta,. Gajendra Singh & Ravindra Gupta, "Advance cryptography algorithm for improving data security " in IJARCSSE Volume 2, Issue 1ISSN: 2277 128X , Jan 2012.
  8. Omar Elkeelan & Adegoke Olabisi, "Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware" in Acedmic Publisher, 2008.
  9. Sasirekha N, Hemalatha M , "An Enhanced Code Encryption Approach with HNT Transformations for Software Security", International Journal of Computer Applications (0975 – 8887) Volume 53– No. 10, September 2012
  10. Nagaraju Devarakonda, Srinivasulu Pamidi, V Valli Kumari & A Govardhan, " Integrated Bayes Network and Hidden Markov Model for Host Based IDS" in IJCA Volume 41– No. 20, March 2012.
  11. Maisam Mohammadian, Nasser Mozayani, "Improving of Authentication Mechanism in IMS Environment By Integration Hop By Hop And End To End Model", International Journal of Soft Computing And Software Engineering (JSCSE) e-ISSN: 2251-7545 Vol. 2, 2012.
  12. Ziming Zhao & Gail-Joon Ahn, "Risk-Aware Mitigation for MANET Routing Attacks" in IEEE Transaction on dependable & secure computing, vol 9, no 2, 2012.
  13. Rakesh Bobba, Himanshu Khurana & Manoj Prabhakaran, "Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption" in University of Illinois at Urbana-Champaign, July 2009.
  14. John Bethencourt, Amit Sahai & Brent Waters, "Ciphertext-Policy Attribute-Based Encryption", in NSF CNS-0524252 US Army Research, in 2009.
  15. Kan Yang, Zhen Liu, Zhenfu Cao, Xiaohua Jia, Duncan S. Wong & Kui Ren, "TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems" in University at Buffalo, 2011.
  16. Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Xiaorui Gong & Shimin Chen, "POSTER: Temporal Attribute-Based Encryption in Clouds" in ACM CCS 11, ISSN: 978-1-4503-0948-6/11/10, Dec 2011.
  17. Sushmita Ruj, Amiya Nayak & Ivan Stojmenovic, "DACC: Distributed Access Control in Clouds" in IEEE TrustCom-11/IEEE ICESS-11, ISSN 978-0-7695-4600-1/11, 2011.
  18. Amit Sahai & Hakan Seyalioglu, "Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption" in DARPA N11AP20006, University of Texas, Aug 2012.
  19. Changji Wang & Jianfa Luo, "An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length" in Mathematical Problems in Engineering Volume 19 , Article ID 810969, 2013.
  20. Nishant Doshi & Devesh Jinwala, "Updating Attribute in CP-ABE: A New Approach" in IJCA ICDCIT , ISSN 0975 – 8887, 2013.
  21. Neena Antony & A. Alfred Raja Melvin, "An Efficient Approach For Flexible And Scalable Access Control Through HASBE" in IJCSMR Vol 2 Issue 4, ISSN 2278-733X, April 2013.
  22. Sunitha Muppa, R. Lakshman Naik & Chalapathi Valupula, "Secure Scheme of Data Protection in Cloud Computing" in IJCST Vol. 3, Issue 1, ISSN: 0976-8491, Mar 2012.
  23. Shilpa Elsa Abraham, "Distributed Attribute Based Encryption for Patient Health Record Security under Clouds" in IJCTT, Vol 4 Issue 3, 2013.
  24. Anup R. Nimje, V. T. Gaikwad & H. N. Datir, "Attribute-Based Encryption Techniques in Cloud Computing Security : An Overview" in IJCTT, Vol 4 Issue3,2013.
Index Terms

Computer Science
Information Sciences

Keywords

CP-ABE(Cipher Text Policy Attribute Based Encryption) KP-ABE (Key Policy attribute Based Encryption) MA-ABE (Multi Authority Attribute Based Encryption) Cloud Platform ABE (Attribute Based Encryption) TBSSM (Trust Based Security Service Model) Access Policy