A Novel Approach for Efficient Data Sharing and Revocation with Data Access control

Authors

  • Banothu N Department of CSE, Holy Mary Institute of Technology & Science, Keesara, Hyderabad, Telangana
  • Dayaker P Department of CSE, Holy Mary Institute of Technology & Science, Keesara, Hyderabad, Telangana
  • Reddy PB Department of ECE, Holy Mary Institute of Technology & Science, Keesara, Hyderabad, Telangana

DOI:

https://doi.org/10.26438/ijcse/v6i11.764769

Keywords:

Cloud storage, Cipher text cryptographic encryption, programmed-release encryption

Abstract

The novel paradigm of data outsourcing on the cloud is a double-edged sword. On the one hand, it frees data management owners and allows data owners to more easily share their data with targeted users. On the other hand, this poses new challenges in terms of privacy and security. In order to protect the confidentiality of data from the honest but curious cloud service provider, many works have been proposed to support data access control with precise rules. However, so far, no system is able to support both granular access control and the publication of time-sensitive data. In this article, integrating timed cryptography into Cipher text cryptographic encryption (CP-ABE) encryption, we propose a new control of time access and attributes on time-sensitive data for archiving. In the public cloud (called TAFC). Based on the proposed scheme, we also propose an efficient approach to designing policies to access the various access requirements for time-sensitive data. The indepth analysis of safety and performance shows that the proposed scheme is highly efficient and meets the security requirements for data storage in the public cloud

References

[1] Z. Qin, H. Xiong, S. Wu, and J. Batamuliza, “A surveyof proxy re-encryption for secure data sharing in cloudcomputing,” IEEE Transactions on Services Computing,Avaliable online, 2016.

[2] F. Armknecht, J.-M. Bohli, G. O. Karame, and F. Youssef,“Transparent data deduplication in the cloud,” inProceedings of the 22nd ACM SIGSAC Conference onComputer and Communications Security, pp. 886–900,ACM, 2015.

[3] R. Masood, M. A. Shibli, Y. Ghazi, A. Kanwal, andA. Ali, “Cloud authorization: exploring techniques and approach towards effective access control framework,”Frontiers of Computer Science, vol. 9, no. 2, pp. 297–321, 2015.

[4] K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Computing, vol. 16,no. 1, pp. 69–73, 2012.

[5] J. Bethencourt, A. Sahai, and B. Waters, “Cipher text policy attribute-based encryption,” in Proceedings of the28th IEEE Symposium on Security and Privacy (S&P’07), pp. 321–334, IEEE, 2007.

[6] Z. Wan, J. Liu, and R. H. Deng, “HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 743–754,2012.

[7] K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, “DACMACS: Effective data access control for multi-authority cloud storage systems,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 11, pp. 1790–1801, 2013.

[8] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalableand secure sharing of personal health recordsin cloud computing using attribute-based encryption,”IEEE Transactions on Parallel and Distributed Systems,vol. 24, no. 1, pp. 131–143, 2013.

[9] E. Bertino, P. A. Bonatti, and E. Ferrari, “TRBAC: Atemporal role-based access control model,” ACM Transactionson Information and System Security, vol. 4, no. 3,pp. 191–233, 2001.

[10] I. Ray and M. Toahchoodee, “A spatio-temporal rolebasedaccess control model,” in IFIP Annual Conferenceon Data and Applications Security and Privacy, pp. 211–226, Springer, 2007.

Downloads

Published

2025-11-18
CITATION
DOI: 10.26438/ijcse/v6i11.764769
Published: 2025-11-18

How to Cite

[1]
N. Banothu, P. Dayaker, and P. B. Reddy, “A Novel Approach for Efficient Data Sharing and Revocation with Data Access control”, Int. J. Comp. Sci. Eng., vol. 6, no. 11, pp. 764–769, Nov. 2025.