SLGP Header

Privacy and Secure rescindable information Access management in Multi-Authority Cloud

IJCSEC Front Page

Abstract:
Cloud computing provides Cloud storage as a service to the users for hosting their information within the cloud. Information access management is that the well-organized methodology to supply information security in cloud. Cipher text-Policy Attribute-based cryptography (CP-ABE) is generally thought of for information access management in cloud storage. The present CP-ABE is tough to use in multi-authority cloud storage owing to the attribute revocation downside. The projected reversible multi-authority CP-ABE theme provides answer to the attribute revocation downside. The projected theme updates the parts of the revoked attribute solely and generates latest secret keys for the revoked attribute and forwards it to the non-revoked users World Health Organization have the attributes as revoked attributes. The backward security and Forward security is assured. If the revoked user enters into the system once more by doing the registration method suggests that, the actual user is known via the positive identification detail within the revocation list and cannot be else to the system, so they're stopped at the registration section itself.
Keywords:Access control, multi-authority, CP-ABE, attribute revocation, cloud storage.
INTRODUCTION
Cloud storage is an important service of cloud computing, which offers services for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces a great challenge to data access control. Because the cloud server cannot be fully trusted by data owners, they can no longer rely on servers to do access control. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage systems, because it gives the data owner more direct control on access policies. In CP-ABE scheme, there is an authority that is responsible for attribute management and key distribution. The data hosting and data access in cloud initiate a challenge in data access control. The cloud servers cannot be fully trusted by data owners, they cannot be able to rely on servers to do access control. The data owners cannot be able to assign the data access policies for the users according to their attribute relationship. In multi-authority cloud storage systems, user’s attributes can be changed dynamically. A user may have new attribute generated by several other authorities and the user may revoke some of the current attributes. The users data accessing permission is should be changed accordingly with the dynamic adoption of new attribute entitling and attribute revocation.
Multi-authority CP-ABE is mostly considered technology for data access control in cloud storage systems. Users may hold various attributes issued by multiple authorities. The data access policy over the attribute is defined by the authorities and not by the data owners. The existing system is not applicable for multi-authority cloud storage due to its attribute revocation problem. If any attribute is revoked means all the Cipher text associated with the authority whose attribute is revoked should be replaced or updated. The existing system relies on a trusted server.

References:

  1. Bethen court J. et al (2007), Cipher text-Policy Attribute-Based Encryption’, in Proc. IEEE Symp. Security and privacy (S&P’07), pp. 321-334.
  2. Sreedevi N. (2013),’Attribute Based Encryption for Scalable and Secure Sharing of Medical Records in Cloud Computing Design and Implementation’, International Journal of Innovative Research in Computer and Communication Engineering, Vol.1, Issue3.
  3. Chase M. (2007), ‘Multi-Authority Attribute Based Encryption’, in Proc. 4th Theory of Cryptography Conf. Theory of Cryptography (TCC’07), pp. 515-534.
  4. Jahid S. et al, (2011), ‘Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation’, in Proc. 6th ACM Symp. Information, Computer and Comm. Security (ASIACCS’11), pp. 411-415.
  5. Kan Yang et al (2014), ‘Expressive, Efficient, and Revocable DataAccess Control for Multi-Authority Cloud Storage,’ IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 7.
  6. Natarajan Meghanathan (2013),’Review of Access Control Models for Cloud Computing’, CS & IT-CSCP ,pp.77-85.
  7. Takashima K. et al (2010), ‘Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption’, in Proc.Advances in Cryptology-EUROCRYPT’10, pp. 62-91.
  8. Waters B. (2011), ‘Cipher text-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization’, in Proc.4th Int’l Conf. Practice and Theory in Public Key Cryptography (PKC’11), 2011, pp. 53-70.