Fine Grained Access Control Policy with Advanced Encryption Standard in the Cloud Computing


  • Krishna Keerthi Chennam
  • Lakshmi Mudda





CP-ABE, AES, Cloud Data Base, Data Security, Access Control Policy.


The Data Base as a Service is a great example where the database engine and storage devices are in cloud data. This scheme allows customers to outsource data and store in cloud database on pay per user, scalable and flexible. But data confidentiality is in high risk when data is outsourced and stored in third party database. A trusted third party server must be maintaining the third party data base. There is a possibility of malicious administrator who can leaks the data which is stored in third party database. The best method is to encrypt the data and store in third party database but alone encryption is not sufficient. Even authorization is another problem that who can access the data. For data security and authorized of users, the fine grained access control policy Cipher text policy Attribute Based encryption (CP-ABE) is used to give access to authorized users only and the best symmetric encryption Advanced Encryption Standard(AES) is applied on data before outsourcing the data in cloud.



[1] A.Behl, “Emerging Security Challenges in Cloud Computing: An insight to cloud security challenges and their mitigationâ€, word congress on Information and Communication Technologies,2011, PP. 217-222.

[2] M. Peter and G. Tim. The NIST Definition of Cloud Computing. National Institute of Standards and Technology, 53(6):50, 2009.

[3] Z. Xiao and Y. Xiao, Security and privacy in cloud computing. Communications Surveys Tutorials, IEEE, PP(99):1 –17, 2012.

[4] A.B. Lewko et al, ‘‘New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques,’’ in Proc. 32st Ann. Int’l Cryptology Conf.: Advances in Cryptology - CRYPTO’12, Vol. 7417, pp. 180-198,2012.

[5] Shucheng Yu, Cong Wang, KuiRen, Wenjing Lou - Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 261- 270, 2010.

[6] S. Narayan, M. Gagné, R. Safavi- Naini, “Privacy preserving EHR system using attribute-based infrastructureâ€, In Proceedings of the ACM workshop on Cloud computing security, pp. (47-52), 2010.

[7] K. Yang and X. Jia, “Attributed-based access control for Multi authority systems in cloud storageâ€, in Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference on, 2012, pp. 536–545.

[8] J. Bethencourt, A. Sahai, and B. Waters, Cipher text policy attribute based encryption, in Proceeding IEEE Symposium Security and Privacy, 2007

[9] Ryan M.D, “Cloud computing privacy concerns on our doorstepâ€, Communications of the ACM, Vol. 54, No.1, pp.36–38, 2011.

[10] Ryan M.D, “Cloud computing security: The scientific challenge, and a survey of solutionsâ€, Journal of Systems and Software, Vol.86, No.9, pp.2263-2268,2013.

[11] Amit sahai and Brent Waters,†Fuzzy identity-based encryptionâ€, In advances in cryptology EUROCRYPT 2005,pp 457-473.

[12] Allison Lweko,Amit Sahai, and Brent Waters,†Revocation systems with very small private keysâ€, In IEEE Symposium on Security and Privacy,2010, PP 273-285.

[13] Brent Waters,†Cipertext-policy attribute based encryption:An expressive efficient, and provably secure realizationâ€, In Public key Cryptography-PKC 2011,pp53-70

[14] Xieming Liu, JinboXiong, “Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Controlâ€, 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2013.

[15] Qinyi Li, Hu Xiong, and Fengil Zhang,†Broad cast revocation scheme in composite order bilinear group and its application to attribute based encryption . International Journal of Security and Networks,2013,pp 1-12.

[16] C.H.Liu,F.Q.Lin,C.S.Chen,T.S.Chen,â€Design of secure access control scheme for personal health record based cloud health care serviceâ€, Security and Communication Networks,2015,Vol.8,No.7,pp.1332-1346.

[17] Rijmen V, Daemen J. Advanced encryption standard. Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology. 2001:19-22.

[18] Samarati P, De Capitani di Vimercati S. “Data protection in outsourcing scenarios: issues and directions.†In: Proceedings of the 5th ACM Symposium on information, computer and communications security (ASIACCS). ACM; pp. 1e14, 2010.

View Full Article: