Attribute based Access Control Scheme in Cloud Storage System
Keywords:Attribute Based Encryption, Secure Access Control, Data Owner, User, Cloud.
Cloud Computing is an emerging technology now a days , where cloud is most preferable when there is data backup, storage and data distribution service with low cost. But cloud is semi honest in nature due to not reveled storage and security structure thus while storing and sharing cloud data , its suppose to honest and secured. When data owners outsource their data in secured manner system should assure the security, data integrity and confidentiality. Here we noticed secure access controlling is the prime objective for sensitive data management.in this regards we have been used ABE (Attribute based encryption) for the above objective. This paper concentrates on secure storage and sharing system.
 Amazon Elastic Compute Cloud (Amazon EC2). http://aws.amazon.com/ec2/
 Amazon Web Service (AWS). http://s3.amazonaws.com/
 Google App Engine (GAE). http://code.google.com/appengine/
 Microsoft Azure. http://www.windowsazure.com
 R.W. Conway, W.L. MaxWell and H.L. Morgan, â€œOn the implementation of security measures in formation systems,â€ Communations of the ACM, vol. 15, no. 4, pp:211-220, April. 1972.
 D.E. Denning,â€A Lattice Model of Secure Information Flow,â€ Communications of the ACM, vol. 19, no. 5, pp:236-243, May. 1976.
 D.E. Bell and L.J. LaPadula, â€œSecure Computer System: Unified Exposition and Multics Interpretation,â€ Technical Report TRA885320, The MITRE Corp., Bedford, MA, Mar. 1976.
 K.J. Biba, â€œIntegrity Considerations for Secure Computer Systems,â€ Technical Report TR-A423930, The MITRE Corp., Bedford, MA, Apr. 1977.
 R. Sandhu, E.J. Coyne and H.L. Feinstein, â€œRole-based access control models,â€ IEEE Computer, vol. 29, no. 2, pp:38-47, Feb. 1996.
 A. Ge, R. Zhang and C. Chen, â€œThreshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts,â€ Public Key Cryptography : 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010),LNCS 7372, pp: 336-349, 2012
 R.Srinivas, Ajay Kumar,â€ Attribute-Based Encryption for Reliable and Secure Sharing of PHR in Cloud Computingâ€, International Journal of Computer Engineering in Research Trends., vol.2, no.10, pp. 679-682, 2015.
 PRAVEEN KUMAR , S.NAGA LAKSHMI,â€ Efficient Data Access Control for Multi-AuthorityCloud Storage using CP-ABE.â€, International Journal of Computer Engineering in Research Trends., vol.2, no.12, pp. 1182-1187, 2015.
 B.Natraj Kumar, M.Sri Lakshmi,DrS.Prem Kumar,â€Investigation on Revocable Fine-grainedAccess Control Scheme for Multi-AuthorityCloud Storage Systemsâ€,International Journal of Computer Engineering in Research Trends., vol.2, no.8, pp. 486-491, 2015.
 V. Himaja,K.Lakshmi,Dr.S.Prem Kumar,â€ Decentralized Access Control to Secure Data Storage on Cloudsâ€, International Journal of Computer Engineering in Research Trends., vol.3, no.1, pp. 13-18, 2016.
 K.Manohar, R. Anil Kumar, N.Parashuram,â€Key Aggregate Searchable Encryption forGroup Data Sharing Via Cloud Data Storageâ€,International Journal of Computer Engineering in Research Trends., vol.2, no.12, pp. 1132-1136, 2015.
 B. Seetharamulu; Dr. G. V. Uma â€œSecure Data Access in P2P Cloud Using ABACâ€ Asian Journal of Research in Social Sciences and Humanities.,Vol. 6, No. 6, June 2016, pp. 1400-1409.