Attribute based Access Control Scheme in Cloud Storage System

  • Authors

    • Banoth SeethaRamulu
    • H. Balaji
    • Bashetty Suman
    2018-09-25
    https://doi.org/10.14419/ijet.v7i4.6.20228
  • Attribute Based Encryption, Secure Access Control, Data Owner, User, Cloud.
  • Cloud Computing is an emerging technology now a days , where cloud is most preferable when there is data backup, storage and data distribution service with low cost. But cloud is semi honest in nature due to not reveled storage and security structure thus while storing and sharing cloud data , its suppose to honest and secured. When data owners outsource their data in secured manner system should assure the security, data integrity and confidentiality. Here we noticed secure access controlling is the prime objective for sensitive data management.in this regards we have been used ABE (Attribute based encryption) for the above objective. This paper concentrates on secure storage and sharing system.

     

     

  • References

    1. [1] Amazon Elastic Compute Cloud (Amazon EC2). http://aws.amazon.com/ec2/

      [2] Amazon Web Service (AWS). http://s3.amazonaws.com/

      [3] Google App Engine (GAE). http://code.google.com/appengine/

      [4] Microsoft Azure. http://www.windowsazure.com

      [5] R.W. Conway, W.L. MaxWell and H.L. Morgan, “On the implementation of security measures in formation systems,†Communations of the ACM, vol. 15, no. 4, pp:211-220, April. 1972.

      [6] D.E. Denning,â€A Lattice Model of Secure Information Flow,†Communications of the ACM, vol. 19, no. 5, pp:236-243, May. 1976.

      [7] D.E. Bell and L.J. LaPadula, “Secure Computer System: Unified Exposition and Multics Interpretation,†Technical Report TRA885320, The MITRE Corp., Bedford, MA, Mar. 1976.

      [8] K.J. Biba, “Integrity Considerations for Secure Computer Systems,†Technical Report TR-A423930, The MITRE Corp., Bedford, MA, Apr. 1977.

      [9] R. Sandhu, E.J. Coyne and H.L. Feinstein, “Role-based access control models,†IEEE Computer, vol. 29, no. 2, pp:38-47, Feb. 1996.

      [10] A. Ge, R. Zhang and C. Chen, “Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts,†Public Key Cryptography : 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010),LNCS 7372, pp: 336-349, 2012

      [11] R.Srinivas, Ajay Kumar,†Attribute-Based Encryption for Reliable and Secure Sharing of PHR in Cloud Computingâ€, International Journal of Computer Engineering in Research Trends., vol.2, no.10, pp. 679-682, 2015.

      [12] PRAVEEN KUMAR , S.NAGA LAKSHMI,†Efficient Data Access Control for Multi-AuthorityCloud Storage using CP-ABE.â€, International Journal of Computer Engineering in Research Trends., vol.2, no.12, pp. 1182-1187, 2015.

      [13] B.Natraj Kumar, M.Sri Lakshmi,DrS.Prem Kumar,â€Investigation on Revocable Fine-grainedAccess Control Scheme for Multi-AuthorityCloud Storage Systemsâ€,International Journal of Computer Engineering in Research Trends., vol.2, no.8, pp. 486-491, 2015.

      [14] V. Himaja,K.Lakshmi,Dr.S.Prem Kumar,†Decentralized Access Control to Secure Data Storage on Cloudsâ€, International Journal of Computer Engineering in Research Trends., vol.3, no.1, pp. 13-18, 2016.

      [15] K.Manohar, R. Anil Kumar, N.Parashuram,â€Key Aggregate Searchable Encryption forGroup Data Sharing Via Cloud Data Storageâ€,International Journal of Computer Engineering in Research Trends., vol.2, no.12, pp. 1132-1136, 2015.

      [16] B. Seetharamulu; Dr. G. V. Uma “Secure Data Access in P2P Cloud Using ABAC†Asian Journal of Research in Social Sciences and Humanities.,Vol. 6, No. 6, June 2016, pp. 1400-1409.

  • Downloads

  • How to Cite

    SeethaRamulu, B., Balaji, H., & Suman, B. (2018). Attribute based Access Control Scheme in Cloud Storage System. International Journal of Engineering & Technology, 7(4.6), 33-35. https://doi.org/10.14419/ijet.v7i4.6.20228