Weitere Kapitel dieses Buchs durch Wischen aufrufen
Distributed cloud data storage is an advanced and empirical concept in present days for outsourcing of data in cloud. A new decentralized grained access control approach is required for privacy on data storage that supports anonymous authentication. In this paper, we introduce to propose and develop an approach, i.e. Scalable Attribute-Based Encryption (SABE) to achieve grained with flexible and scalable access control in cloud computing for secure distributed cloud storage. SABE not only is scalable due to its pyramid structure, but also shares effective and flexible access control in supporting on ABE; it also assigns for user expiration time and revocation efficiently than existing schemas. Protected data transmission among users should be effective as well as flexible in order to support access control policy models with secure team communication, selective and hierarchal data transfer control in sharing. So in this paper, we propose and develop Transmitted Team Key Management (TTKM), where each client (user) in group shares a secret trust key owner with subsequent rekeying for data sharing join or departure of users requires only broadcast message between data sharing in cloud. We analyze the privacy of proposed TTKM schema and compare with existing SABE security schemas in distributed data sharing. Our experimental results show effective data access control with authorized security considerations.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 457–473.
V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. 13thCCS, 2006, pp. 89–98.
W.-G. Tzeng, “Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters,” IEEE Trans. Comput., vol. 53, no. 2, pp. 232–240, Feb. 2004.
M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute based encryption,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131–143, Jan. 2013.
Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, “Securely Outsourcing Attribute-Based Encryption with Check ability”, proceedings in IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 8, AUGUST 2014.
K. Yang, X. Jia, K. Ren, and B. Zhang, “DAC-MACS: Effective data access control for multi-authority cloud storage systems,” in Proc. IEEE INFOCOM, Apr. 2013, pp. 2895–2903.
S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. IEEE INFOCOM 2010, 2010, pp. 534–542.
Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1985, pp. 47–53.
R. Bobba, H. Khurana, and M. Prabhakaran, “Attribute-sets: A practically motivated enhancement to attribute-based encryption,” in Proc. ESORICS, Saint Malo, France, 2009.
Zhiguo Wan, Jun’e Liu, and Robert H. Deng,” HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRIL 2012.
B. Barbara, “Salesforce.com: Raising the level of networking,” Inf. Today, vol. 27, pp. 45–45, 2010.
J. Bell, Hosting Enterprise Data in the Cloud—Part 9: Investment Value Zetta, Tech. Rep., 2010.
G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,” in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Chicago, IL, 2010.
K.-M. Chung, Y. Kalai, F.-H. Liu, and R. Raz, “Memory Delegation,” in Proc. Adv. Cryptol.-CRYPTO, LNCS 6841, P. Rogaway, Ed., Berlin, 2011, pp. 151–168, Springer-Verlag.
C. Wang, K. Ren, and J. Wang, “Secure and Practical Outsourcing of Linear Programming in Cloud Computing,” in Proc. IEEE INFOCOM, 2011, pp. 820–828.
- SABE: Efficient and Scalable-Filtered Access Control in Distributed Cloud Data Storage
K. Venkateswara Rao
- Springer Singapore