Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism

Full Text (PDF, 491KB), PP.53-60

Views: 0 Downloads: 0

Author(s)

Apurva R. Naik 1,* Lalit B. Damahe 1

1. Yeshwantrao Chavan College of Engineering, Nagpur, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.10.07

Received: 8 Apr. 2016 / Revised: 11 Jul. 2016 / Accepted: 15 Aug. 2016 / Published: 8 Oct. 2016

Index Terms

Cloud computing, Key Escrow, Attribute Based Encryption, Integrity, Confidentiality, Access control

Abstract

Social networking and growing popularity of cloud services have made everyone to communicate each other in an easiest way. File sharing and distribution are the frequently used services provided by cloud service providers, although these facilities reduce cost of data sharing but at the same time data security and access control is the major problem. Many renowned service providers have faced the challenges to secure data and provide better access control, and we know once the data is leaked we cannot recover the data loss. Thus in order to ensure better security we need for focus on the two major problems, and those are access control and encryption policy. Cipher text policy attribute based encryption is the most effective solution for access control in real time scenarios where owner can actually decide the access rights for the end-user, but it comes with key escrow problem. We are proposing our modified escrow-free key issuing protocol to solve the problem of key escrow and our Modified Attribute Based Encryption scheme to achieve all security requirements to get a robust and secure system. Further we evaluate our model on the basis of results and lastly we conclude the paper.

Cite This Paper

Apurva R. Naik, Lalit B. Damahe, "Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.10, pp.53-60, 2016. DOI:10.5815/ijcnis.2016.10.07

Reference

[1]http://www.salesforce.com/assets/pdf/misc/WPForcedotcomSecurity.pdf
[2]https://cloud.google.com/files/Google-Common-Security/
[3]http://media.amazonwebservices.com/AWSSecurityBestPractices.pdf
[4]Allen Oommen Joseph, Jaspher W. Kathrine, Rohit Vijayan, ‘Cloud Security Mechanisms for Data Protection: A Survey.”, International Journal of Multimedia and Ubiquitous Engineering, 2014.9(9), pp.81-90.
[5]http://cloud.google.com/?les/Google-Common-Security-WhitePaperv1.4.pdf
[6]http://www.computing.co.uk/ctg/news/2429256/hackers-see-cloud-as-afruit-bearing-jackpot-for-cyber-attacks
[7]http://www.privacyrights.org/data-breach/new/
[8]http://www-03.ibm.com/security/data-breach/
[9]http://en.wikipedia.org/wiki/2014celebrityphotohack/
[10]http://www.axantum.com/AxCrypt/etc/seagate128vs256.pdf
[11]http://www.cs.cornell.edu/home/llee/data/convote.html
[12]A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology: Proceedings of (CRYPTO ’84), Springer, Berlin, Germany, 1985. vol. 196 of Lecture Notes in Computer Science, pp. 47–53,
[13]A.Sahai and B.Waters, “Fuzzy identity-based encryption,” in EUROCRYPT, ser. Lecture Notes in Computer Science, vol. 3494. Springer, pp. 457–473, 2005.
[14]V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS ’06), pp. 89–98, November 2006.
[15]Bethencourt J, Sahai A, Waters B. “Ciphertext-policy attribute-based encryption.” InSecurity and Privacy, 2007. SP’07. IEEE Symposium on 2007 May 20 (pp. 321-334).
[16]D. Nali, C. Adams, and A. Miri, “Using threshold attribute based encryption for practical biometric-based access control,” International Journal of Network Security, vol. 1, no. 3, pp. 173–182, 2005.
[17]R. Ostrovsky, A. Sahai, and B.Waters, “Attribute-based encryption with nonmonotonic access structures,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS ’07), pp. 195–203, November 2007.
[18]Yu, S., Wang, C., Ren, K., Lou, W., “Achieving secure, scalable and ?negrained data access control in cloud computing”, In INFOCOM, March-2010.
[19]Bethencourt, John, Amit Sahai, and Brent Waters. “Ciphertextpolicy attribute based encryption.” Security and Privacy, 2007. SP’07. IEEE Symposium on. IEEE, 2007.
[20]Nabeel, M.; Bertino, E, “Privacy Preserving Delegated Access Control in Public Clouds,” in Knowledge and Data Engineering, IEEE Transactions on , vol.26, no.9, pp.2268-2280,Sept.2014 doi: 10.1109/TKDE.2013.68
[21]A.Rani, “Improving Security and efficiency in Distributed Data Sharing and Data Leakage Detection System”, International journal of emerging sciences and research technology, ISSN: 2277-9655, November, 2013.
[22]Balamurugan B, Venkata Krishna P, “Extensive Survey on Usage of Attribute Based Encryption in Cloud”, journal of emerging technologies in web intelligence, vol. 6, no. 3, august 2014.
[23]Deyan Chen, Hong Zhao, “Data Security and Privacy Protection Issues in Cloud Computing”, International Conference on Computer Science and Electronics Engineering, 2012.
[24]Yu, S., Wang, C., Ren, K. and Lou, W., 2010, April. “Attribute based data sharing with attribute revocation.” In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (pp. 261-270). ACM.
[25]M. Chase, “Multi-authority attribute based encryption,” in Theory of Cryptography, vol. 4392 of Lecture Notes in Computer Science, pp. 515–534, Springer, Berlin, Germany,2007.
[26]L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS ’07), pp. 456– 465,November 2007.
[27]R. Ostrovsky, A. Sahai, and B.Waters Attribute-based encryption with non-monotonic access structures,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS ’07), pp. 195–203, November 2007.
[28]G.Wang, Q.Liu, and J.Wu, “Hierarchical attribute-based encryption for fine grained access control in cloud storage services,” in Proc.ACM Conf. Computer and Communication security(ACM CCS), Chicago.IL,2010.
[29]Zhiguo Wan, Jun’e Liu, and Robert H.Deng, “HASBE: A Hierarchical Attribute Based solution for Flexible and Scalable Access Control in Cloud Computing,” IEEE Transaction on Information Forensics and Security, Vol.7, No.2, April 2012.
[30]S. Zhu, X. Yang and X. Wu, “Secure Cloud File System with Attribute Based Encryption,” 5th International Conference on, Intelligent Networking and Collaborative Systems (INCoS), 2013, pp. 99-102.
[31]Junbeom Hur, “Improving Security and efficiency in Attribute-Based Data Sharing”, IEEE Transactions on Knowledge and Data Engineering, vol.25, no. 10, pp. 2271-2282, Oct. 2013, doi:10.1109/TKDE.2011.78
[32]Zhibin Zhou, Dijiang Huang; Zhijie Wang, “Efficient Privacy Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption,” in Computers, IEEE Transactions on , vol.64, no.1, pp.126-138, Jan. 2015doi: 10.1109/TC.2013.200.
[33]Venkateshprasad, Kalluri, D.Haritha, “CIPHER-Text Policy Attribute Based Access to Cloud”, IJCSIT Vol. 5 (3), 2014, 2796-2799.
[34]Shin, Dongwan, Rodrigo Lopes, and William Claycomb. “Authenticated dictionary-based attribute sharing in federated identity management.” Sixth International Conference on Information Technology: New Generations, ITNG’09 2009. IEEE.
[35]Shuaishuai Zhu, Xiaoyuan Yang, XuGuang Wu, ‘Secure Cloud File System with Attribute based Encryption ”, 5th International Conference on Intelligent Networking and Collaborative Systems,2013 Pages 99-102.
[36]Tesfahun, A. and Bhaskari, D.L., “Effective Hybrid Intrusion Detection System: A Layered Approach”, International Journal of Computer Network and Information Security, 2015. 7(3), p.35.
[37]Arani, M.G. and Shamsi, M. “An Extended Approach for Efficient Data Storage in Cloud Computing Environment”, International Journal of Computer Network and Information Security, 7(8), 2015, p.30.
[38]Lazzez A, Slimani T. Forensics investigation of web application security attacks. International Journal of Computer Network and Information Security. 2015 Feb 1; 7(3):10.