AN EXTENSIVE STUDY TOWARDS ACHIEVING FINE GRAINED ACCESS CONTROL ON ENCRYPTED CLOUD DATA
Main Article Content
Abstract
                  Outsourcing of business, Scientific and engineering data application on the Third party administrative cloud server have been increasing from the past decade. Unfortunately many servers disregard the security requirement which entails serious security concerns. To provide Confidentiality on the shared sensitive data, many cryptographic technique are usually applied in large numbers though it has lead to serious challenges in the cloud storage against data sharing.In this paper, we study on achieving fine grained access control on encrypted cloud data against several kinds of attacks propagating to the cloud servers such as key leakage attack, Cipher text attack by deducing the key for encryption and decryption. Fine grained access control is employed against encrypted data. In addition to more advantage, the access control mechanism also faces several issues in terms of automatic revocation. In order to handle implication of this study, we plan to propose an Ensemble operator on the Fine grained access control through Time, Location and Profile constrainst on the access policy to the attribute set defined. In this notion, expensive access policy generation for decryption of the cipher text is offloaded to the cloud to some extent. Even obtaining encryption key and decryption key, attacker will not help in decrypting the ciphertext. The proposed notion is used as key encapsulation mechanism to the data outsourced to cloud via third party application. Through extensive analysis on different fine grained access control mechanism on the outsourced data, the ensemble operator model can gain significant performance to highlight the scalability and efficiency.Â
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
W. Yau, R. Phan, S. Heng, B. Goi, “Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester, 2013†in International Journal of Computer Mathematics, ,volume 90, Issue: 2, pp. 2581-2587
C. Wang, Q. Wang, K. Ren, N. Cao, W. Lou, “Toward secure and dependable storage services in cloud computing,†Services Computing, IEEE Transactions on, vol. 5, no. 2, pp. 220–232, 2012.
Y. Zhu, H. Hu, G.-J. Ahn, M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,†IEEE Transactions on Parallel Distributed Systems, vol. 23, no. 12, pp. 2231–2244, 2012.
Y. Dodis, J. Katz, S.Xu,M. Yung, “Key-insulated public key cryptosystems,†in Advances in Cryptology–EUROCRYPT 2002 in Springer, volume.2332 ,pp. 65–82.
B. Libert, J.J.Quisquater, M. Yung, “Parallel key-insulated public key encryption without random oracles,†in Public Key Cryptography 2007, Springer, pp. 298–314.
Baodong Qin, Robert H Deng, Shengli Liu, Siqi Ma†Attribute based encryption with efficient verifiable outsourced decryption†2015. In IEEE Transactions on Information Forensics and Security, volume.10, issue 7,pp:1384–13935.
Zhiguo Wan, Jun’e Liu, and Robert H Deng. Hasbe: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE transactions on information forensics and security, 7(2):743–754, 2012.
Yanjiang Yang, , Jianyong Zhou. Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data. 2015, In Computer Security - ESORICS 2015, pp 146–166.
Hon Yuen, Joseph K Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou. k-times attribute-based anonymous access control for cloud computing. IEEE Transactions on Computers, 64(9):2595–2608, 2015.
. J.Qian X.Dong,“Fully secure revocable attribute-based encryptionâ€2011,Journal of Shanghai Jiaotong University (Science), vol. 16, pp. 490–496.
Ximeng Liu,Robert H. Deng ,Kim-Kwang Raymond Choo , Jian Weng"An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys"IEEE Transactions on Information Forensics and Security in Volume: 11, Issue: 11, Nov. 2016
. Jia Yu, Kui Ren, Cong Wang,Vijay Varadharajan "Enabling Cloud Storage Auditing With Key-Exposure Resistance" IEEE Transactions on Information Forensics and Security in Volume: 10, Issue: 6, June 2015