Decentralized Access Control Technique for Secure Data Stored in Cloud Computing

  • S Sankareswari University of Pune
  • Ashwini A More
Keywords: Paillier algorithm, authentication, access policy, access control, cloud storage

Abstract

A new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the user without knowing the user’s identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. The communication, computation and storage overheads are comparable to centralized approaches. The architecture is decentralized, meaning that there can be several KDCs for key management. Paillier algorithm is used for Creation of access policy, file accessing and file restoring process

References

[1] D. F. Ferraiolo and D. R. Kuhn, “Role-based access controls,” in 15th National Computer Security Conference, 1992. [2] D. R. Kuhn, E. J. Coyne, and T. R. Weil, “Adding attributes to rolebased access control,” IEEE Computer, vol. 43, no. 6, pp. 79–81, 2010. [3] M. Li, S.Yu, K. Ren, and W.Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings,” in SecureComm, 2010, pp. 89–106.
[4] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in ACM ASIACCS, 2010, pp. 261–270. [5] G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,” in ACM CCS, 2010, pp. 735–737. [6] F. Zhao, T. Nishide, and K. Sakurai, “Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems,” in ISPEC, ser. Lecture Notes in Computer Science, vol. 6672. Springer, 2011, pp. 83–97. [7] S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed access control in clouds,” in IEEE TrustCom, 2011. [8] H. K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-based signatures: Achieving attribute- privacy and collusion-resistance,” IACR Cryptology ePrint Archive, 2008. [9] “Attribute-based signatures,” in CT-RSA, ser. Lecture Notes in Computer Science, vol. 6558. Springer, pp. 376–392, 2011. [10] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in EUROCRYPT, ser. Lecture Notes in Computer Science, vol. 3494. Springer, pp. 457–473, 2005. [11] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in ACM Conference on Computer and Communications Security, pp. 89–98, 2006. [12] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext- policy attributebased encryption,” in IEEE Symposium on Security and Privacy. , pp. 321–334, 2007. [13] X. Liang, Z. Cao, H. Lin and D. Xing, “Provably Secure and Efficient Bounded Ciphertext Policy Attribute Based Encryption,” in ACM ASIACCS, pp 343–352, 2009. [14] M. Chase, “Multi-authority attribute based encryption,” in TCC, ser. Lecture Notes in Computer Science, vol. 4392. Springer, pp. 515–534, 2007. [15] H. Lin, Z. Cao, X. Liang and J. Shao, “Secure Threshold Multiauthority Attribute Based Encryption without a Central Authority,” in INDOCRYPT, ser. Lecture Notes in Computer Science, vol. 5365, Springer, pp. 426–436, 2008. [16] M. Chase and S. S. M. Chow, “Improving privacy and security in multiauthority attribute-based encryption,” in ACM Conference on Computer and Communications Security, pp. 121–130, 2009. [17] Matthew Green, Susan Hohenberger and Brent Waters, “Outsourcing the Decryption of ABE Ciphertexts,” in USENIX Security Symposium, 2011. [18] Kan Yang, Xiaohua Jia and Kui Ren, “ DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems”, IACR Cryptology ePrint Archive, 419, 2012. [19] A. B. Lewko and B. Waters, “Decentralizing attribute- based encryption,” in EUROCRYPT, ser. Lecture Notes in Computer
Published
2018-03-21
How to Cite
Sankareswari, S., & More, A. (2018). Decentralized Access Control Technique for Secure Data Stored in Cloud Computing. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 2(2). Retrieved from http://www.asianssr.org/index.php/ajct/article/view/164
Section
Article

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.