Open Access   Article Go Back

Secured Cloud Storage via Attribute-based Encryption

B. Sowmya1 , K. Madhavi2

  1. Dept. of CSE, Gokaraju Rangaraju Institute of Engineering and Technology, Ranga Reddy, India.
  2. Dept. of CSE, Gokaraju Rangaraju Institute of Engineering and Technology, Ranga Reddy, India.

Correspondence should be addressed to: sowmyabagari5@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-7 , Page no. 96-100, Jul-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i7.96100

Online published on Jul 30, 2017

Copyright © B. Sowmya, K. Madhavi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B. Sowmya, K. Madhavi, “Secured Cloud Storage via Attribute-based Encryption,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.96-100, 2017.

MLA Style Citation: B. Sowmya, K. Madhavi "Secured Cloud Storage via Attribute-based Encryption." International Journal of Computer Sciences and Engineering 5.7 (2017): 96-100.

APA Style Citation: B. Sowmya, K. Madhavi, (2017). Secured Cloud Storage via Attribute-based Encryption. International Journal of Computer Sciences and Engineering, 5(7), 96-100.

BibTex Style Citation:
@article{Sowmya_2017,
author = {B. Sowmya, K. Madhavi},
title = {Secured Cloud Storage via Attribute-based Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2017},
volume = {5},
Issue = {7},
month = {7},
year = {2017},
issn = {2347-2693},
pages = {96-100},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1372},
doi = {https://doi.org/10.26438/ijcse/v5i7.96100}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i7.96100}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1372
TI - Secured Cloud Storage via Attribute-based Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - B. Sowmya, K. Madhavi
PY - 2017
DA - 2017/07/30
PB - IJCSE, Indore, INDIA
SP - 96-100
IS - 7
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
688 382 downloads 344 downloads
  
  
           

Abstract

Cloud storage services have become increasingly popular. Because of the importance of privacy, many cloud storage encryption schemes have been struggle to protect data from the attackers. All of that schemes assumed that cloud storage providers are safe and it won’t be target by the attackers; however, in practice, some government (i.e., coercers) may force cloud storage providers to expose user secrets or private data on the cloud, thus altogether avoid storage encryption schemes. In this paper, we present our design for a new cloud storage encryption scheme that enables cloud storage providers to create authentic fake user secrets to protect user privacy. By utilizing our systems scrambled information can be up to confidential regardless of the possibility that the capacity server is endowed; in addition, our techniques are secure against agreement assaults. Since coercers can`t reveal if got privileged insights are valid or not, the distributed storage suppliers guarantee that client protection is still safely ensured. And we are also providing secret key mechanism which is aspired by KDC (Key distribution Center) one of the module and also authentication for each user to make the more secured and confidential. Were also captured the unauthorized attackers’ information also.

Key-Words / Index Term

Encryption, Attribute Based Encryption, Cloud Storage

References

[1] Shreeraghav kulkarni, Sujata Terdal, "Ttpse- Trusted Third Party With Symmetric Encryption Towards Secured Cloud Storage", International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.47-51, 2017.
[2] V. Kapoor, "Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.35-38, 2013.
[3] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[4] S. Mewada, P. Sharma, and S. S. Gautam, “Investigation of Efficient Cryptic Algorithm for Text using SM Crypter”, International Journal of Information Science and Computing, vol. 3, no. 2, p. 99, 2016.
[5] A. Sahai, H. Seyalioglu, and B. Waters, “Dynamic credentials and ciphertext delegation for attribute-based encryption”, in Crypto, 2012, pp. 199–217.
[6] S. Hohenberger and B. Waters, “Attribute-based encryption with fast decryption”, in Public Key Cryptography, 2013, pp. 162–179.
[7] P. K. Tysowski and M. A. Hasan, “Hybrid attribute and reencryption based key manage-ment for secure and scalable mobile app-lications in clouds”, IEEE T. Cloud Computing, pp. 172–186, 2013.
[8] D. Bradbury, “Can we make email secure?”, Network Security, vol. 2014, no. 3, pp. 13–16, Mar. 2014.
[9] P.-W. Chi and C.-L. Lei, “Audit-Free Cloud Storage via Deniable Attribute-based Encryption”, IEEE Transactions on Cloud Computing, pp. 1–1, 2015.
[10] R. F. Anda, A. Butchart, V. J. Felitti, and D. W. Brown, “Building a Framework for Global Surveillance of the Public Health Implications of Adverse Childhood Experiences”, American Journal of Preventive Medicine, vol. 39, no. 1, pp. 93–98, Jul. 2010.
[11] Surbhi Sharma, "Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme", International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.111-115, 2016.
[12] P.Gasti, G.Ateniese, and M. Blanton, “Deniable cloud storage: sharing files via public-key deniability”, Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, pp. 31– 42, 2010.