Encryption-Based Secure and Efficient Access Control to Out Sourced Data in Cloud Computing

  • Authors

    • V Naresh
    • M Anudeep
    • M Saipraneeth
    • A Saikumar Reddy
    • V Navya
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15703
  • Cloud storage, Slim Strip, policy-based access control, Decentralized elimination code, double serial proxy coding, threshold encoding, secure storage system, access control, reliable deletion
  • The cloud stockpiling framework, comprising of capacity servers, gives long haul stockpiling administrations on the Internet. Maintaining the data in the cloud computing of third parties generates: serious concern about the confidentiality of data and the reduction of data management costs. Nonetheless, we should give security certifications to outside information. We plan and actualize a protected cloud stockpiling framework that gives secure, secure and available record security for document administration and secure information exchange. It includes foreign files with a file access policy, possibly deleting files, to avoid being denied to anyone with a file access policy. To achieve these security objectives, a set of password keys is implemented that maintain a host (s) or head (s) separately. We offer a twofold edge intermediary coding plan and incorporate it with a decentralized disposal code, which is detailed with a safely Cloud storage framework. The Cloud storage system not only provides a secure and stable search and storage of data, but also allows the user to transfer their data to the user of the backup to another user without the data being returned.

     

     

  • References

    1. [1] Amazon. SmugMug Case Study: Amazon Web Services. http://aws.amazon.com/solutions/case-studies/smugmug/, 2006.

      [2] Amazon Simple Storage Service (Amazon S3). http://aws.amazon.com/s3/.

      [3] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee,D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the Clouds: A Berkeley View of Cloud Computing. Technical Report UCB/EECS-2009-28, EECS Department, Universi-ty of California, Berkeley, Feb 2009.

      [4] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik. Scala-ble and Efficient Provable Data Possession. In Proc. of SecureComm, 2008.

      [5] R. Geambasu, T. Kohno, A. Levy, and H. M. Levy. Vanish: Increasing Data Privacy with Self-Destructing Data. In Proc. of USENIX Security Symposium, Aug 2009.

      [6] Hu H. Security-Enhanced OSGi Service Environments. IEEE Trans. Systems, Man, and Cybernetics-Part C: Applications and Reviews 2009; 39(5): 562–571.

      [7] Joshi J. Access Control Language for Multidomain Environments. IEEE Internet Computing 2004; 8(6): 40–50.

      [8] Joshi JBD. SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments. Proc. 1st IEEE Int’lWorkshop Emerging Applications for Cloud Computing (CloudApp 2010), IEEE CS Press, 2010; 393–398.

      [9] Joshi et al . State Miner: An Efficient Similarity- Based Approach for Optimal Mining of Role Hierarchy. Proc. 15th ACM Symp. Ac-cess Control ModelsAnd Technologies, ACM Press, 2010; 55–64.

      [10] Paxson V . What’s New About Cloud Computing Security? tech. report UCB/EECS- 2010-5, EECS Dept., Univ. of California, Berke-ley, 2010. www.eecs.berkeley.edu/Pubs/TechRpts/ 2010/EECS-2010-5.html

      [11] H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon, “RACS: A Case for Cloud Storage Diversity,†Proc. ACM First ACM Symp. Cloud Computing(SoCC).

      [12] Dropbox, http://www.dropbox.com.

      [13] T. Dierks and E. Rescorla, “The Transport Layer Security (TLS) Protocol Version 1.2,†RFC 5246

      [14] W. Stallings, Cryptography and Network Security. Prentice Hall, 2006.

      [15] “Service Oriented Architecture & Web Servicesâ€. Dr.Raghu Reddy, Mr.Madan Kumar Srinivasan. Seminar program conducted in LBRCE Aug2013.

      [16] A.G. Dimakis, V. Prabhakaran, and K. Ramchandran, “Decen-tralized Erasure Codes for Distributed Networked Storage,†IEEE Trans.Information Theory, vol. 52, no. 6 pp. 2809-2816, June 2006.

  • Downloads

  • How to Cite

    Naresh, V., Anudeep, M., Saipraneeth, M., Saikumar Reddy, A., & Navya, V. (2018). Encryption-Based Secure and Efficient Access Control to Out Sourced Data in Cloud Computing. International Journal of Engineering & Technology, 7(2.32), 315-321. https://doi.org/10.14419/ijet.v7i2.32.15703