International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

A Novel Approach for Data Privacy Using Attribute Based Scheme Algorithm for Cloud Computing

Author NameAuthor Details

A.Nithya, B. Ramakrishnan, Resul Das

A.Nithya[1]

B. Ramakrishnan[2]

Resul Das[3]

[1]Research Scholar, S.T Hindu College, Nagercoil, Tamilnadu, India.

[2]Department of Computer Science and Research Centre, S.T Hindu College, Nagercoil, Tamilnadu, India.

[3]Department of Software Engineering, Firat University, Elazig, Turkey.

Abstract

Cloud computing is the mass storage area that helps the user to access the data anywhere. There are so many platforms provided by the cloud service provider. They are SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service) etc. Though security is not fully provided by the cloud service provider to reshape the advances in information technology, cloud computing is expected as an updated technology. The data was securely stored in the cloud and if it is corrupted then the proxy is implemented to regenerate the corrupted data in the cloud. Thus security and integrity is successfully achieved. This is further extended by implementing efficient file fetching by the third party user. To maintain efficient file fetching system Multi authority cloud model is proposed. The model is continuing with the proposed entities such as Attribute authority (AA), Certificate Authority (CA) and Third party end user. The data is encrypted by the owner and stored in the cloud server. CA is used to delegate the Secret Key (SK) to AA and Public Kay (PK) to user. After Checking the authentication of the owner CA provides PK to the owner only then the owner is allowed to upload the data in cloud, the data is encrypted and outsource to the cloud server. Using SK the third party user is allowed to view the data from the cloud. If the user enter the wrong key or misuse the data, user will be revoked. If the User needs to download or update or delete the data in the cloud the user need to send a Data Access Privilege (DAP) request to the respective owner. Certificate authority is responsible to generate a key to the entities such as User, Data Owner and attributes.

Index Terms

Cloud Computing

Security

Third Party Auditor (TPA)

Proxy

RSA Algorithm

Regeneration

Multiuser Authentication

Reference

  1. 1.
    W. Diffie and M. Hellman, “New direction in cryptography,” IEEE Information Theory, vol. 22, no. 6, pp. 644-654, Sep. 1976.
  2. 2.
    Q. Wang, C. Wang, J. Li, K. Ran, and W. Lou, ―Enabling Public Verifiability and Information Dynamic for Storage Security in Cloud Computing,‖ in the Proceedings of ESORICS 2009. Springer-Verlag, 2009, pp. 355–370.
  3. 3.
    D. Boneh and X. Boeh, “Short signatures without random oracles, in Proc. Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2004, pp. 56-73.
  4. 4.
    Wang, Boyang, Baochun Li, and Hui Li. "Panda: public auditing for shared data with efficient user revocation in the cloud." IEEE Transactions on services computing 8.1 (2015): 92-106.
  5. 5.
    Z. Liu, J. Li, X. Chen, J. Yang, and C. Jia, “TMDS: Thin-model data sharing scheme supporting keyword search in cloud storage,” Information Security and Privacy Lecture Notes in Computer Science, vol. 8544, pp. 115-130, 2014.
  6. 6.
    C. Liu, J. Chen, L. Yang, X. Zhang, C. Yang, R. Ranjan, and K. Ra-mamohanrao, “Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates,” IEEE Transactions Parallel and Distributed Systems, vol. 25, no. 9, pp. 2234-2244, Sep. 2014.
  7. 7.
    M.S.Premalatha and Dr.B.Ramakrishnan “Green scheduling of Bag-of-tasks Applications in cloud data centre using green cloud simulator” Journal of Emerging technologies in web intelligence, vol.6, no.3, August 2014.
  8. 8.
    B. Wang, B. Li, and H. Li,Oruta: “privacy-preserving public auditing for shared data in the cloud,” in Proc. IEEE International Conference on Cloud Computing, 2012, pp. 293-302.
  9. 9.
    Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public audit ability and data dynamics for storage security in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
  10. 10.
    Panda: Public Auditing for Shared Information with Efficient User Revocation in the Cloud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE, transactions on service computing no:99 vol:pp year 2014.
  11. 11.
    J. Yuan and S. Yu, “Efficient public integrity checking for cloud data sharing with multi-user modification,” in Proc. IEEE INFOCOM, 2014, pp. 2121-2129
  12. 12.
    Y. Zhu, G. Ahn, H. Hu, S. Yau, H.An, and S. Chen, “Dynamic audit services for outsourced storages in clouds,” IEEE Transactions on Services Competing, vol. 6, no. 2, pp. 227-238, 2013.
  13. 13.
    B. Wang, B. Li, and H. Li, “Knox: Privacy-preserving public auditing for shared data with large groups in the cloud,” in Proc. of ACNS, 2012, pp. 507-525.
  14. 14.
    Dr. J. Suganthi, Ananthi .J S. Archana,” Privacy preservation and Public Auditing for cloud Data Using ASS”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 3, Issue 6, November-December 2014 PP: 242-247.
  15. 15.
    B. Wang, B. Li, and L. Hui, “Panda: Public auditing for shared data with efficient user revocation in the cloud,” in Proc. IEEE INFOCOM, pp. 2904-2912, 2013.
  16. 16.
    D. Boneh and M. K. Franklin, “Identity-based encryptions from the wail pairing,” in CRYPTO’01. Springer-Verlag, 2001, pp. 213- 229.
IJCNA NPC