CFP last date
20 December 2024
Reseach Article

Hierarchical Attribute Based Encryption in Cloud Environment

Published on December 2014 by Sapana Kapadnis
Innovations and Trends in Computer and Communication Engineering
Foundation of Computer Science USA
ITCCE - Number 1
December 2014
Authors: Sapana Kapadnis
7d9091de-60f5-4bd6-b298-80b15f83379a

Sapana Kapadnis . Hierarchical Attribute Based Encryption in Cloud Environment. Innovations and Trends in Computer and Communication Engineering. ITCCE, 1 (December 2014), 17-20.

@article{
author = { Sapana Kapadnis },
title = { Hierarchical Attribute Based Encryption in Cloud Environment },
journal = { Innovations and Trends in Computer and Communication Engineering },
issue_date = { December 2014 },
volume = { ITCCE },
number = { 1 },
month = { December },
year = { 2014 },
issn = 0975-8887,
pages = { 17-20 },
numpages = 4,
url = { /proceedings/itcce/number1/19041-2005/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Innovations and Trends in Computer and Communication Engineering
%A Sapana Kapadnis
%T Hierarchical Attribute Based Encryption in Cloud Environment
%J Innovations and Trends in Computer and Communication Engineering
%@ 0975-8887
%V ITCCE
%N 1
%P 17-20
%D 2014
%I International Journal of Computer Applications
Abstract

In the IT industry cloud computing is considered as one of the most important paradigms. In cloud computing we have to store our data at cloud providers place. While doing data storage and management cloud security and privacy on outsource data increasing these days. Attribute Based Encryption (ABE) techniques came into existence for secure access control like Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and Key-Policy Attribute-Based Encryption (KP-ABE). These techniques suffer from problems in implementing flexible and scalable access control mechanisms. This paper provides Hierarchical Attribute-Based Solution in cloud environment. On outsourced data it provides both efficient and flexible access control in cloud computing. In addition it provides multiple value assignment for expiration time to deal with features like user revocation.

References
  1. Zhiguo Wan, Jun'e Liu, and Robert Deng,"HASBE:A Hierarchical Attribute-Based Solutionfor Flexible andScalable Access Controlin Cloud Computing", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRIL 2012.
  2. R. Buyya, C. ShinYeo, J. Broberg, and I. Brandic, "Cloud computing emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation Comput. Syst. , vol. 25, pp. 599–616, 2009.
  3. Amazon Elastic Compute Cloud (Amazon EC2) [Online]. vailable:http://aws. amazon. com/ec2
  4. Amazon Web Services (AWS) [Online]. Available:https://s3. amazonaws. com
  5. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attibute based Encryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Alexandria,VA 2006.
  6. S. Yu, C. Wang, K. Ren, and W. Lou, "Achiving secure, scalable, and fine-grained data access control in cloud computing," in Proc. IEEE INFOCOM 2010, 2010, pp. 534–542.
  7. J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext policy a Attribute based encryption," in Proc. IEEE Symp. Security and Privacy, Oakland,CA, 2007.
  8. R. Bobba, H. Khurana, and M. Prabhakaran, "Attribute sets: A practically motivated enhancement to attribute-based encryption," in Proc. ESORICS, Saint Malo, France, 2009
Index Terms

Computer Science
Information Sciences

Keywords

Access Control Cloud Computing Security Privacy.