ENHANCING DATA SECURITY: SECURE AND EXPRESSIVE ACCESS CONTROL FOR CLOUD STORAGE

Main Article Content

A. Hanumanth Prasad
G. Ramanaiah
M. Ayyappa Chakravarthy
Pillutla Venkata Ramanaiah

Abstract

In order to ensure the classification of reappropriated information while also providing adaptable information access to cloud clients whose information is not under their physical control, secure distributed storage is a growing cloud administration trend. One of the most promising methods for verifying the administration's certification is cypher text-policy attribute-based encryption (CP-ABE). Due to the inherent "win big or bust" unscrambling feature of CP-ABE, the adoption of CP-ABE may result in an inescapable security breach known as the abuse of access accreditation (for example, decoding privileges). Here, we focus on two key cases in which a cloud client's access qualification is abused by a semi-believed specialist. CryptCloud+, a distributed storage platform with white-box discernibility and review, is proposed as a way to limit the exploitation of the system. Additionally, we demonstrate the framework's usefulness by conducting studies.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Prasad, A. H. ., Ramanaiah, G. ., Chakravarthy, M. A. ., & Ramanaiah, P. V. (2019). ENHANCING DATA SECURITY: SECURE AND EXPRESSIVE ACCESS CONTROL FOR CLOUD STORAGE. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 10(3), 1594–1599. https://doi.org/10.61841/turcomat.v10i3.14561
Section
Articles

References

KaipingXue ”RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public

Cloud Storage”, IEEE2016.

Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data

with efficiency improvement,” IEEE Transactions on Parallel & Distributed Systems, vol. 27, no. 9, pp. 2546–

, 2016.

Z. Fu, X. Sun, S. Ji, and G. Xie, “Towards efficient content-aware search over encrypted outsourced data in

cloud,” in in Proceedings of 2016 IEEE Conference on Computer Communications (INFOCOM 2016). IEEE,

, pp. 1–9.

K. Xue and P. Hong, “A dynamic secure group sharing framework in public cloud computing,” IEEE

Transactions on Cloud Computing, vol. 2, no. 4, pp. 459–470, 2014.

Y. Wu, Z. Wei, and H. Deng, “Attributebased access to scalable media in cloudassisted content sharing,” IEEE

Transactions on Multimedia, vol. 15, no. 4, pp. 778–788, 2013.

J. Hur, “Improving security and efficiency in attributebased data sharing,” IEEE Transactions on Knowledge

and Data Engineering, vol. 25, no. 10, pp. 2271– 2282, 2013.

J. Hur and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems,”

IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214–1221, 2011.

J. Hong, K. Xue, W. Li, and Y. Xue, “TAFC: Time and attribute factors combined access control on

timesensitive data in public cloud,” in Proceedings of 2015 IEEE Global Communications Conference

(GLOBECOM 2015). IEEE, 2015, pp. 1–6.

Y. Xue, J. Hong, W. Li, K. Xue, and P. Hong, “LABAC: A location-aware attributebased access control

scheme for cloud storage,” in Proceedings of 2016 IEEE Global Communications Conference (GLOBECOM

. IEEE, 2016, pp. 1–6.

A. Lewko and B. Waters, “Decentralizing attribute based encryption,” in Advances in Cryptology–

EUROCRYPT 2011. Springer, 2011, pp. 568–588