A Novel Approach for Efficient Data Sharing and Revocation with Data Access control
Narsimha Banothu1 , P. Dayaker2 , P. Bhaskara Reddy3
Section:Survey Paper, Product Type: Journal Paper
Volume-6 ,
Issue-11 , Page no. 764-769, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.764769
Online published on Nov 30, 2018
Copyright © Narsimha Banothu, P. Dayaker, P. Bhaskara Reddy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Narsimha Banothu, P. Dayaker, P. Bhaskara Reddy , “A Novel Approach for Efficient Data Sharing and Revocation with Data Access control,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.764-769, 2018.
MLA Style Citation: Narsimha Banothu, P. Dayaker, P. Bhaskara Reddy "A Novel Approach for Efficient Data Sharing and Revocation with Data Access control." International Journal of Computer Sciences and Engineering 6.11 (2018): 764-769.
APA Style Citation: Narsimha Banothu, P. Dayaker, P. Bhaskara Reddy , (2018). A Novel Approach for Efficient Data Sharing and Revocation with Data Access control. International Journal of Computer Sciences and Engineering, 6(11), 764-769.
BibTex Style Citation:
@article{Banothu_2018,
author = {Narsimha Banothu, P. Dayaker, P. Bhaskara Reddy },
title = {A Novel Approach for Efficient Data Sharing and Revocation with Data Access control},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {764-769},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3240},
doi = {https://doi.org/10.26438/ijcse/v6i11.764769}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.764769}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3240
TI - A Novel Approach for Efficient Data Sharing and Revocation with Data Access control
T2 - International Journal of Computer Sciences and Engineering
AU - Narsimha Banothu, P. Dayaker, P. Bhaskara Reddy
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 764-769
IS - 11
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
407 | 298 downloads | 318 downloads |
Abstract
The novel paradigm of data outsourcing on the cloud is a double-edged sword. On the one hand, it frees data management owners and allows data owners to more easily share their data with targeted users. On the other hand, this poses new challenges in terms of privacy and security. In order to protect the confidentiality of data from the honest but curious cloud service provider, many works have been proposed to support data access control with precise rules. However, so far, no system is able to support both granular access control and the publication of time-sensitive data. In this article, integrating timed cryptography into Cipher text cryptographic encryption (CP-ABE) encryption, we propose a new control of time access and attributes on time-sensitive data for archiving. In the public cloud (called TAFC). Based on the proposed scheme, we also propose an efficient approach to designing policies to access the various access requirements for time-sensitive data. The in-depth analysis of safety and performance shows that the proposed scheme is highly efficient and meets the security requirements for data storage in the public cloud.
Key-Words / Index Term
Cloud storage, Cipher text cryptographic encryption, programmed-release encryption
References
[1] Z. Qin, H. Xiong, S. Wu, and J. Batamuliza, “A surveyof proxy re-encryption for secure data sharing in cloudcomputing,” IEEE Transactions on Services Computing,Avaliable online, 2016.
[2] F. Armknecht, J.-M. Bohli, G. O. Karame, and F. Youssef,“Transparent data deduplication in the cloud,” inProceedings of the 22nd ACM SIGSAC Conference onComputer and Communications Security, pp. 886–900,ACM, 2015.
[3] R. Masood, M. A. Shibli, Y. Ghazi, A. Kanwal, andA. Ali, “Cloud authorization: exploring techniques and approach towards effective access control framework,”Frontiers of Computer Science, vol. 9, no. 2, pp. 297–321, 2015.
[4] K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Computing, vol. 16,no. 1, pp. 69–73, 2012.
[5] J. Bethencourt, A. Sahai, and B. Waters, “Cipher text policy attribute-based encryption,” in Proceedings of the28th IEEE Symposium on Security and Privacy (S&P’07), pp. 321–334, IEEE, 2007.
[6] Z. Wan, J. Liu, and R. H. Deng, “HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 743–754,2012.
[7] K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, “DACMACS: Effective data access control for multi-authority cloud storage systems,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 11, pp. 1790–1801, 2013.
[8] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalableand secure sharing of personal health recordsin cloud computing using attribute-based encryption,”IEEE Transactions on Parallel and Distributed Systems,vol. 24, no. 1, pp. 131–143, 2013.
[9] E. Bertino, P. A. Bonatti, and E. Ferrari, “TRBAC: Atemporal role-based access control model,” ACM Transactionson Information and System Security, vol. 4, no. 3,pp. 191–233, 2001.
[10] I. Ray and M. Toahchoodee, “A spatio-temporal rolebasedaccess control model,” in IFIP Annual Conferenceon Data and Applications Security and Privacy, pp. 211–226, Springer, 2007.