This paper is published in Volume-4, Issue-2, 2018
Area
Cloud Computing
Author
Mayank Milind Murdio
Co-authors
Shrirang Rajiv Paretkar, Saurabh Sanjay Vaidya, Rushikesh Gajanan Duve
Org/Univ
Rajiv Gandhi College of Engineering and Research, Nagpur, Maharashtra, India
Pub. Date
14 March, 2018
Paper ID
V4I2-1200
Publisher
Keywords
Cloud Computing, Database, Encryption Techniques and Decryption Techniques.

Citationsacebook

IEEE
Mayank Milind Murdio, Shrirang Rajiv Paretkar, Saurabh Sanjay Vaidya, Rushikesh Gajanan Duve. Secured Data Access in Cloud Computing, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Mayank Milind Murdio, Shrirang Rajiv Paretkar, Saurabh Sanjay Vaidya, Rushikesh Gajanan Duve (2018). Secured Data Access in Cloud Computing. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.

MLA
Mayank Milind Murdio, Shrirang Rajiv Paretkar, Saurabh Sanjay Vaidya, Rushikesh Gajanan Duve. "Secured Data Access in Cloud Computing." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.

Abstract

Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. This paper proposed some services for data security and access control when users outsource sensitive data for sharing on cloud servers. This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine grained data access control to untrusted cloud servers without disclosing the underlying data contents. Our proposed scheme enables the data owner to delegate tasks of data file re-encryption and user secret key update to cloud servers without disclosing data contents or user access privilege information. We achieve this goal by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re-encryption. Our proposed scheme also has salient properties of user access privilege confidentiality and user secret key accountability and achieves fine - grainedness, scalability and data confidentiality for data access control in cloud computing. Extensive analysis shows that our proposed scheme is highly efficient and provably secures under existing security models.
Paper PDF