Open Access   Article Go Back

Extensible and Fine-Grained Characteristics-Positioned Information Storage in Cloud Computing

S. Rajput1 , Iyapparaja M2

  1. School of Information Technology and Engineering, VIT University, Vellore, India.
  2. School of Information Technology and Engineering, VIT University, Vellore, India.

Correspondence should be addressed to: iyapparaja.m@vit.ac.in.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-5 , Page no. 137-142, May-2017

Online published on May 30, 2017

Copyright © S. Rajput, Iyapparaja M . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Rajput, Iyapparaja M, “Extensible and Fine-Grained Characteristics-Positioned Information Storage in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.137-142, 2017.

MLA Style Citation: S. Rajput, Iyapparaja M "Extensible and Fine-Grained Characteristics-Positioned Information Storage in Cloud Computing." International Journal of Computer Sciences and Engineering 5.5 (2017): 137-142.

APA Style Citation: S. Rajput, Iyapparaja M, (2017). Extensible and Fine-Grained Characteristics-Positioned Information Storage in Cloud Computing. International Journal of Computer Sciences and Engineering, 5(5), 137-142.

BibTex Style Citation:
@article{Rajput_2017,
author = {S. Rajput, Iyapparaja M},
title = {Extensible and Fine-Grained Characteristics-Positioned Information Storage in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2017},
volume = {5},
Issue = {5},
month = {5},
year = {2017},
issn = {2347-2693},
pages = {137-142},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1278},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1278
TI - Extensible and Fine-Grained Characteristics-Positioned Information Storage in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - S. Rajput, Iyapparaja M
PY - 2017
DA - 2017/05/30
PB - IJCSE, Indore, INDIA
SP - 137-142
IS - 5
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
461 304 downloads 473 downloads
  
  
           

Abstract

With the improvement of distributed computing, outsourcing information through distributed server’s pulls in loads of considerations. To ensure the security and accomplish adaptable fine-grained record access control, (ABE) was proposed and utilized as a part of distributed storage framework. As client repudiation is the essential issue in ABE plans. we proposed an cipher text-arrangement trait-based encryption (CP-ABE) plan with effective client repudiation for distributed storage framework. The concern about client repudiation can be explained productively by presenting the idea of client gathering. At the point when any client leaves, the gathering supervisor will redesign client’s PK with the exception of the individuals, who have been declined. Also, CP-ABE plan has substantial calculation cost, as it becomes straightly with the intricacy to access structure. To diminish the calculation price, utilizing big calculation burden to cloud administration suppliers without spilling document substance and mystery keys. Notably, our plan can withstand conspiracy assault performed by denied clients collaborating with existing clients.

Key-Words / Index Term

distributed computing, cipher-text attribute-based encryption, Data owner, cloud server, private keys, co-llusion attack

References

[1] VG. Pandey, A. Sahai, B. Wates, “Property Based Encryption for Fine-Grained Access Control of Encrypted Data”, ACM Computer and Communications Security, Vol.4, Issue.2, pp.89-98, 2006,
[2] Y. Ming, L. Fan, H. Jing-Li, W. Zhao-Li, “An Efficient Attribute Based Encryption Scheme with Revocation for Outsourced Data Sharing Control”, 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control, Beijing, pp. 516-520, 2011.
[3] A. Sharma, RS Thakur, S. Jaloree, “Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud”, International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.6, pp.8-14, 2016.
[4] R. Lathwal, V.K. Saroha, “A Study on Biometric Technology and Access Control System: Network Security”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.7, pp.31-35, 2014.
[5] M. Chase, “Multi-authority Attribute Based Encryption”, Proc. 4th Theory of Cryptography Conference, Berlin, pp. 515-534, 2007.
[6] Z. Liu, Z. Cao, Q. Huang, D.S. Wongand, T.H. Yuen, “Fully Secure Multi-Authority Ciphertext-Policy Attribute-Based Encryption with-out Random Oracles”, Proc.16th European Symposium on Research in Computer Security, Berlin, pp. 278-297, 2011.
[7] A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption”, EUROCRYPT-LNCS, Vol. 3494, Issue. 8, pp. 457-473, 2005.
[8] J.G. Han, W. Susilo, Y. Mu, J. Yan, “Privacy-Preserving Decentral-ized Key-Policy Attribute-Based Encryption”, IEEE Transactions on Parallel and Distributed Systems, Vol.23, No.11, pp. 2150-2162, 2012.
[9] D. Boneh, M.K. Franklin, “Identity-Based Encryption from theWeil Pairing”, CRYPTO ’01, LNCS, Vol. 2139, Issue.2, pp. 213-229, 2001.
[10] J. Hr and D. K. Noh, “Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems”, IEEE Transactions onParallel and Distributed Systems, Vol. 2, Issue.1, pp. 1214-1221,2011.
[11] P.K. Tyswski, M.A. Haan, “Hybrid Attribute-Based Encryption and Re-Encryption for Scalable Mobile Applications in Clouds”, IEEE Transactions on Cloud Computing, Vol. 5, Issue.8, pp. 172-186, 2013.
[12] J.W. Li, C.F. Jia, J. Li, X.F. Chen, “Outsourcing Encryption of At-tribute-Based Encryption with Mapreduce”, Proc.14th International conference on Information and Communications Security, Berlin, pp.191-201, 2012.
[13] M. Green, S. Hohenberger, B. Waters, “Outsourcing the decryp-tion of ABE ciphertexts”, USENIX, Vol.10, Issue.8, pp. 1-34, 2011.
[14] H.L. Qian, J.G. Li, Y.C. Zhang, “Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Ac-cess Structure”, Proc.15th International ConferenceonInformation and Communications Security, Berlin, Vol. 23, Issue. 4, pp.363-372, 2013.
[15] J.T .Ning, Z.F. Cao, X.L. Dong, L.F. Wei, X.D. Lin, “Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Trace-ability”, Proc.19th European Symposium on Research inComputer Security, Berlin, pp. 55-72, 2014.