Open Access   Article Go Back

Implementation of TVES for Enhancing Performance of Attribute Based Encryption and Collaboration in the Cloud Storage

Salim Y. Amdani.1 , Sohel A. Bhura2 , Akshada D. Yevatkar3

  1. Dept. of CSE, B.N. College of Engineering, Pusad, India.
  2. Dept. of CSE, B.N. College of Engineering, Pusad, India.
  3. ME student, Dept. of CSE, B.N. College of Engineering, Pusad, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 506-512, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.506512

Online published on May 31, 2018

Copyright © Salim Y. Amdani., Sohel A. Bhura, Akshada D. Yevatkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Salim Y. Amdani., Sohel A. Bhura, Akshada D. Yevatkar, “Implementation of TVES for Enhancing Performance of Attribute Based Encryption and Collaboration in the Cloud Storage,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.506-512, 2018.

MLA Style Citation: Salim Y. Amdani., Sohel A. Bhura, Akshada D. Yevatkar "Implementation of TVES for Enhancing Performance of Attribute Based Encryption and Collaboration in the Cloud Storage." International Journal of Computer Sciences and Engineering 6.5 (2018): 506-512.

APA Style Citation: Salim Y. Amdani., Sohel A. Bhura, Akshada D. Yevatkar, (2018). Implementation of TVES for Enhancing Performance of Attribute Based Encryption and Collaboration in the Cloud Storage. International Journal of Computer Sciences and Engineering, 6(5), 506-512.

BibTex Style Citation:
@article{Amdani._2018,
author = {Salim Y. Amdani., Sohel A. Bhura, Akshada D. Yevatkar},
title = {Implementation of TVES for Enhancing Performance of Attribute Based Encryption and Collaboration in the Cloud Storage},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {506-512},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2012},
doi = {https://doi.org/10.26438/ijcse/v6i5.506512}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.506512}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2012
TI - Implementation of TVES for Enhancing Performance of Attribute Based Encryption and Collaboration in the Cloud Storage
T2 - International Journal of Computer Sciences and Engineering
AU - Salim Y. Amdani., Sohel A. Bhura, Akshada D. Yevatkar
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 506-512
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
430 275 downloads 197 downloads
  
  
           

Abstract

Cloud computing is a set of different types of hardware and software activities that work collectively to deliver many aspects of computing to the end user as an online services. It provides on demand scalable and cost effective services for storing documents. However with all of these features it enters with number of challenges associated in utilizing the cloud securely. Achieving unbreakable document or outsourced data security is an important issue to consider. For this purpose encryption has been suggested, with the popularity of using cryptography to store data in the cloud Attribute Based Encryption receives widespread attention of the researchers. Also to provide security to the outsourced documents, Attribute based encryption is an excellent solution. On the other side of cloud environment, to increase productivity of the cloud, collaboration with more users is important. But the encryption limits the admission of newly authorized user to acquire the data because, when the ciphertext is need to be share with others legally there will be necessity of extending an original access policy specified in ABE. In this process, at the time of extending policy, data uploader had to download ciphertext, modify the access policy as per current requirement and then reupload the data with modified access permissions. This significantly increases the processing time to extend access policy and consumes server space unnecessarily. To address above problem we have introduce modified attribute based encryption with time varying encryption scheme for document encryption which is based on the research of Time Varying Camellia Encryption Algorithm for the cloud storage environment and a novel solution for access permission management in which we will use metadata file to store access permission. Finally we discuss the evaluation result made in between existing work and proposed system.

Key-Words / Index Term

Time varying encryption, Extended Access Control, Collaboration in cloud, Attribute Based Encryption

References

[1] Hamlen, K., Kantarcioglu, M., Khan, L., Thuraisingham, B.,”Security issues for cloud computing”, International Journal of Information Security and Privacy, 2010
[2] Chen, Y., Paxson, V., Katz, R. ,”What’s new about cloud computing security”, Tech. Rep. UCB/EECS-2010-5, Electrical Engineering and Computer Sciences, University of California at Berkeley 2010.
[3] Kandukuri, B., Paturi V, R., Rakshit, ,”A.: Cloud security issues”, In: Proceedings of the IEEE International Conference on Services Computing, SCC’09, pp. 517–520. IEEE Computer Society, Washington, DC, USA DOI 10.1109/SCC.2009.84,2009.
[4] Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, , Yong Yu and Yi Mu, Extendable Access Control System with IntegrityProtection,IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY DOI 10.1109/TIFS.2017.2737960.
[5] Amit Sahai and Brent Waters, “Fuzzy identity-based encryption,” in EUROCRYPT 2005, ser. LNCS, vol. 3494, 2005, pp. 457–473.
[6] Saravana Kumar, Rajya Lakshmi, Balamurugun. Enhanced Attribute Based Encryption For Cloud Computing , International Conference on Information and Communacation Technologies (ICICT 2014)
[7] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine- grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, 2006, pp. 89–98.
[8] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute based encryption,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1,pp. 131–143, 2013.
[9] Issa M. Khalil, Abdallah Khreishah and Muhammad Azeem “Cloud Computing Security: A Survey”, Computers, 2014
[10] P. Shanmuga Priya and R. Sugumar, “MultiKeyword Searching echniques over Encrypted Cloud Data”, IJSR,2014.
[11] Cong Wang, Ning Cao, Kui Ren and Wenjing Lou “Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data”, IEEE Transactions on Parallel and Distributed Systems, 2012.jk
[12] Preethi.D, Priya.J and shanthini.B, “Retrieval of Encrypted Data Using Multi Keyword Top –K Algorithm”, International Journal of Scientific and Research Publications, 2014.
[13] Yan Wang and Nihong Wang , “Research on Time-Varying Camellia Encryption Algorithm”, https://link.springer.com/chapter/10.1007/978-3-642-29455-6_110.
[14] Kapil Dev Raghuwanshi, Prof. Sitendra Tamrakar, An effective Access from Cloud Data using AttributeBased Encryption,2015 1st International conference on futuristic trend in computational analysis and knowledge management (ABLAZE 2015).