An Efficient Scheme to Support Direct Revocation in Cloud Computing Using CPABE :the Approach with Less Time Constraints

  • Authors

    • Miss. Rupali G. Dande
    • Prof. Dr. Amol D. Potgantwar
    2018-07-07
    https://doi.org/10.14419/ijet.v7i3.8.16849
  • Cloud Computing, Cloud security, access structure, ABE, CPABE, revocation, File hierarchy.
  • Secure Data sharing is a major issue of concern in cloud computing. CPABE is well known encryption technique for dealing with the problem of data security over the network. Most of the files have multilevel access hierarchy especially in health care and military domain. The hierarchy structure and revocation of shared files is not scrutinized in CP-ABE. In this paper, experts proposed the enhanced method of encryption to support the direct revocation, in which sender specifies the revocation list during encryption of cipher text so that the problem of releasing periodic key update information in indirect revocation is vanished. Here the direct revocation mechanism and file access based hierarchy are merged to get enhanced CPABE. The multilevel access structure is integrated and merged with encrypted files with the current access structure. Along with revocation, aim is also to improve the overall system performance with respect to encryption time and decryption time. Experimental result shows the enhanced performance of the proposed system as compared to existing system with respect to time and security constraints. Moreover the scheme is secure under the standard security assumption. Finally, based on the research, it gives forthcoming research direction to expand and implement the scheme in any practical application where security is main concern by proper coalition of the proposed technologies.

     

  • References

    1. [1] Hashizume et al., “An analysis of security issues for cloud computingâ€, Journal of Internet Services and Applications, 2013.

      [2] J.Bethencourt, A. Sahai and B. Waters, Ciphertext - policy attribute based encryption, Proc. IEEE Symposium on Security and Privacy, pp. 321-334, 2007.

      [3] A. Sahai, B. Waters, Fuzzy identity based encryption, Proc. EUROCRYPT 2005, LNCS 3494, Springer, pp. 457473, 2005.

      [4] Jiguo Li, Yao Wang, Yichen Zhang and Jinguang Han, “Full Verifiability for Outsourced Decryption in Attribute Based Encryptionâ€, February 2016, IEEE Transactions.

      [5] Chun-I Fan, Yi-Fan Tseng, and Chih-Wen Lin, “Attribute-Based Encryption from Identity-Based Encryptionâ€, SEPTEMBER 2016, JOURNAL OF LATEX CLASS FILES.

      [6] Anand Tripathi and Gowtham Rajappan, “Scalable Transaction Management for Partially Replicated Data in Cloud Computing Environmentâ€, 2016 IEEE 9th International Conference on Cloud Computing.

      [7] V. Goyal, O. Pandey, A. Sahai and B.Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proc. 13th ACM conference on Computer and Communications Security, pp. 89-98, 2006.

      [8] Yibin Li a, Keke Gaib, Long fei Qiu, Meikang Qiub ,Hui Zhao d, “Intelligent cryptography approach for secure distributed big data storage in cloud computingâ€, 2016, ELSEVIER..

      [9] Cheng-Chi Lee, Pei-Shan Chung, and Min-Shiang Hwang, “A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environmentsâ€, International Journal of Network Security, July 2013.

      [10] S.Mahdiet.al, “Challenges and security issues in Cloud computing from two perspectives: Data Security and Privacy Protectionâ€, 2015, KBEI.

      [11] Dimitro Zissis, Dimitos Lekkas , â€Addressing CC security issuesâ€,2010, ELSEVIER.

      [12] palivelaHemant,NitinChawande,et al., â€Development of servers in CC to solve issues related to security and backup â€2011,IEEE.

      [13] VasilySidorov,WeeKeong Ng, â€Transparent Data Encryption for Data-in-Use and Data-at-Rest in a Cloud-Based Database-as-a-Service Solutionâ€, 2015, IEEE.

      [14] G Wang et al,Hierarchical ABE for fine grained access control in cloud storage services,17th ACM conference on computer and communication security ,2010.

      [15] Dong,Wang, â€Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigmâ€,2015,IEEE transactions on cloud.

      [16] HuiYin,ZhengQin,et,al., â€Achieving secure ,universal,fine grained query results verification for secure search scheme over encrypted cloud data â€,2016,IEEE transactions on cloud.

      [17] Naeem Ahmed, â€Cloud Computing: Technology, Security Issues and Solutionsâ€,2017,IEEE

      [18] Jiang Schuci,GuoWeibin et al,â€Hierarchy Attribute -Based Encryption scheme to support direct revocation in cloud storageâ€,2017,IEEE.

      [19] Cheng-Chi Lee et al, “A survey on attribute based encryption schemes of access control in cloud environmentâ€, July 2013, International journal of network security.

      [20] HuilingQianJiguoLiYichenZhang,et al.,â€Privacy-Preserving DecentralizedCiphertext-Policy Attribute-Based Encryption with Fully HiddenAccess Structureâ€,2013,International Conference on Informationand Communications Security.

      [21] SuhairAlshehri, Stanisaw P. Radziszowski, and Rajendra K. Ra “Secure Access for Healthcare Data in the Cloud Using Ciphertext-Policy Attribute-Based Encryptionâ€, 2012 IEEE 28th International Conference on Data Engineering Workshops.

      [22] Cheng Guo1, Ruhan Zhuang1,2,Yingmo Jie1, YizhiRen, Ting Wu, Kim-Kwang Raymond Choo, “Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Cloudsâ€,2016 Cross- Mark.

      [23] M. Green, S. Hohenberger, and B. Waters, “Outsourcing the decryption of ABE cipher texts, Proc. The Usenix Security Symposium, pp. 34-34, 2011.

      [24] J. Lai, R. Deng, C. Guan, and J. Weng, “Attribute-based encryption with verifiable outsourced decryptionâ€, IEEE Trans. Information Forensics and Security, vol. 8, no. 8, pp. 1343-1354, 2013, doi:10.1109/TIFS.2013.2271848.

      [25] B. Qin, R.H. Deng, S. Liu and S. Ma, “Attribute-based encryption with efficient verifiable outsourced decryptionâ€, IEEE Trans. Information Forensics and Security, vol. 10, no. 7, pp. 1384-1393, 2015, doi:10.1109/TIFS.2015.2410137.

      [26] X. Mao, J. Lai, Q. Mei, K. Chen and J. Weng, Generic and efficient Constructions of attribute-based encryption with verifiable outsourced decryption, IEEE Trans. Dependable and Secure Computing, 2015, doi:10.1109/TDSC.2015.2423669.

      [27] Edonardo Gaetani et al , Block chain based database to ensure data integrity in cloud environments.

      [28] Chun-I Fan Attribute Based Encryption from Identity Based encryption, Journal of LATEX class files,September 2016.

      [29] Matthew Green, Brent Waters, Susan Hohenberger, Outsourcing the decryption of ABE cipher texts, Proc. The usenix security symposium, pp.34-34, 2011.

      [30] William Stallings Cryptography and Network Security Principles and Practices, Fourth Edition.

  • Downloads

  • How to Cite

    Rupali G. Dande, M., & Dr. Amol D. Potgantwar, P. (2018). An Efficient Scheme to Support Direct Revocation in Cloud Computing Using CPABE :the Approach with Less Time Constraints. International Journal of Engineering & Technology, 7(3.8), 141-146. https://doi.org/10.14419/ijet.v7i3.8.16849