A Study on Secure Sharing of Application Data in Cloud Computing
Keywords:
Cloud Storage, Security, Cloud, PrivacyAbstract
Cloud clients utilizes "Cloud storage" administration to have their information in the cloud. Get to control benefit gave by cloud is accustomed to giving assurance against unapproved access to information. Cipher text-Policy Attribute-Based Encryption (CP-ABE) is generally considered for information get to control in distributed storage. The current CP-ABE is hard to apply in multi-specialist distributed storage because of the characteristic repudiation issue. The proposed revocable multispecialist CP-ABE plot gives answer for the characteristic denial issue. The proposed plot refreshes the segments of the disavowed quality just and produces most recent mystery keys for the repudiated credit and advances it to the non renounced clients who have the properties as denied traits. The Backward security and Forward security is kept up. On the off chance that the repudiated client goes into the framework again by doing the enlistment procedure implies, the specific client is recognized by means of the character card detail in the renouncement rundown and they are not permit in the framework, so that these clients are halted at the enrolment stage itself.
References
[1] J. Bethen court, A. Sahai, and B. Waters, “Cipher text Policy Attribute Based Encryption,” in Proc. IEEE Symp. Security and privacy (S&P07), 2007, pp. 321-334.
[2] B. Waters, “Cipher text-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,” in Proc. 4th Int l Conf. Practice and Theory in Public Key Cryptography (PKC 11), 2011, pp. 53-70.
[3] V. Goyal, A. Jain,O. Pandey, and A. Sahai, ”Bounded Cipher text Policy Attribute Based Encryption,” in Proc. 35th Int l Colloquium on Automata, Languages, and Programming (ICALP08), 2008, pp. 579-591.
[4] A.B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, “Fully Secure Functional Encryption: Attribute Based Encryption and (Hierarchical) Inner Product Encryption,” in Proc. Advances in Cryptology EUROCRYPT 10, 2010, pp. 62-91.
[5] M. Chase, “Multi-Authority Attribute Based Encryption,” in Proc. 4th Theory of Cryptography Conf. Theory of Cryptography (TCC 07), 2007, pp. 515-534.
[6] M. Chase and S.S.M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” in Proc. 16th ACM Conf. Computer and Comm. Security (CCS 09), 2009,pp. 121-130.
[7] A.B. Lewko and B. Waters, “Decentralizing Attribute-Based Encryption,” in Proc. Advances in Cryptology EUROCRYPT 11, 2011, pp. 568-588.
[8] M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, ”Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,” IEEE Trans. Parallel Distributed Systems, vol. 24, no. 1, pp. 131- 143, Jan. 2013.
[9] S. Jahid, P. Mittal, and N. Borisov, “Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation,” in Proc. 6th ACM Symp. Information, Computer and Comm. Security (ASIACCS 11), 2011, pp. 411- 415.
[10]S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed Access Control in Clouds,” in Proc. 10th IEEE Int?l Conf. Trust- Com, 2011, pp. 91-98.
[11]D. Boneh and M.K. Franklin, “Identity-Based Encryption from the Weil Pairing,” in Proc. 21st Ann. Int l Cryptology Conf.: Advances in Cryptology CRYPTO 01, 2001, pp. 213-229.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
