Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016
Decentralized Access Control of Data Stored In Cloud Using Attribute Based Encryption and Hidden Attributes
Sumedha Tathavadekar, Vikas Maral
Cloud computings multi-tenancy feature, which provides privacy, security and access control challenges, because of sharing of physical resources among untrusted tenants. In order to achieve safe storage, policy based file access control, policy based file assured deletion and policy based renewal of a file stored in a cloud environment, a suitable encryption technique with key management should be applied before outsourcing the data. We implemented secure cloud storage by providing access to the files with the policy based file access using Attribute Based Encryption (ABE) scheme with RSA key public-private key combination. Private Key is the combination of the users credentials. So that high security will be achieved. Time based file Revocation scheme is used for file assured deletion. When the time limit of the file expired, the file will be automatically revoked and cannot be accessible to anyone in future. Manual Revocation also supported. Policy based file renewal is proposed. The Renewal can be done by providing the new key to the existing file, will remains the file until the new time limit reaches.
Keywords: Cloud storage, Access control, authentication, attribute-based encryption
Edition: Volume 5 Issue 6, June 2016
Pages: 2579 - 2581
How to Cite this Article?
Sumedha Tathavadekar, Vikas Maral, "Decentralized Access Control of Data Stored In Cloud Using Attribute Based Encryption and Hidden Attributes", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV164848, Volume 5 Issue 6, June 2016, 2579 - 2581
99 PDF Views | 84 PDF Downloads
Similar Articles with Keyword 'Cloud storage'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2619 - 2622Information Security in Multi-Cloud Environment
Digambar D. Patil, Megha Singh
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1939 - 1946An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud
Nagaraj S Kolhar, Dr. Suvarna Nandyal
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1737 - 1740Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud
Nilam Musale, Vilas Gaikwad
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2098 - 2102Public Auditing System with Auto-Data Recovery System on Cloud Scheme
Dhane Sachin V., Joshi P.
Similar Articles with Keyword 'Access control'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1737 - 1740Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud
Nilam Musale, Vilas Gaikwad
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1752 - 1755SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant, Hingoliwala H. A.
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1436 - 1439Secure Transmission in Ad-hoc Network: Using Combined Cryptography
Nilesh T Patil
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2712 - 2714Privacy Preserving DAC for Data in Cloud
Pankaj R. Chandre, Swati S. Gore
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1471 - 1475Performance Improvement In MANET By Using A Modified BEB Algorithm
Aparna S. Mankar, Mangla S. Madankar
Similar Articles with Keyword 'authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2234 - 2237Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1724 - 1727Privacy Preserving Authenticity Framework for Shared Data Cloud Network
P. Vanitha Sree, K. Narayana Rao
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Similar Articles with Keyword 'attribute-based encryption'
Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1788 - 1790Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data
Amruta N. Deshmukh, Komal B. Bijwe
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2128 - 2130A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique
Rasal Swati A., Pawar B. V.
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 639 - 642A Review On Cloud Storage Architectures
Pallavi D. Dudhe, P. L. Ramteke
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2627 - 2631Implementation of Design and Deployment of Secure Sharing Protocol using TTP via Cloud Computing
Kamini H. Gonnade, Fazeel Zama
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1877 - 1881Scalable and Secure Sharing in Cloud Computing Using Data Manipulation & Encryption
Aakanksha Maliye, Sarita Patil