An Efficient Scheme for Big Data Access with Privacy-preserving Policy in Cloud
-
https://doi.org/10.14419/ijet.v7i3.24.22790 -
Watchwords Big Data, Access Control, Privacy- protecting Policy, Attribute Bloom Filter, LSSS Access Structure. -
Abstract
How to administration the entrance of the huge amount of enormous information terms into a horrendously troublesome issue, especially once tremendous learning are keep inside the cloud. Figure content policy Attribute essentially based coding (CP-ABE) might be a promising coding strategy grants end-clients to engrave their insight underneath the entrance arrangements sketched out finished a few qualities of information clients and exclusively permits information clients whose characteristics fulfill the entrance strategies to modify the info. In CP-ABE, the entrance arrangement is associated with the figure message in plaintext type, which can also release some individual information in regards to end -Clint’s. Existing systems exclusively halfway conceal the characteristic qualities inside the entrance approaches, through the property names are as yet unprotected. Amid this paper, we tend to propose Associate in Nursing efficient and fine-grained immense learning access administration topic with security safeguarding policy. In particular, we tend to conceal the total characteristic inside the entrance approaches. To help information coding, we tend to also style a one of a kind Attribute Bloom Filter to measure regardless of whether Associate in Nursing trait in inside the entrance approach and locate the exact position inside the entrance strategy if it’s inside the entrance arrangement. Security investigation and execution examination demonstrate that our topic will safeguard the protection from any LSSS get to arrangement while not utilizing copious overhead.
Â
Â
-
References
[1] B. C. M. FUNG, K.WANG, R. CHEN, AND P. S. YU, “PRIVACY-PRESERVING DATA PUBLISHING: A SURVEY OF RECENT DEVELOPMENTS,†ACM COMPUT. SURV., VOL. 42, NO. 4, PP. 14:1–14:53, 2010.
[2] X. MA, H. Li, J. Ma, Q. Jiang, S. Gao, N. Xi, and D. Lu, “Applet: A privacy-preserving framework for location-aware recommender system,†Sci China Inf Sci, vol. 59, no. 2, pp. 1–15, 2016.
[3] W. Xia, R. Heatherly, X. Ding, J. Li, and B. Malin, “Efficient discovery of de-identification policies through a risk-utility frontier,†in CODASPY, 2013, pp. 59–70.
[4] K. Benitez, G. Loukides, and B. Malin, “Beyond safe harbor: Automatic discovery of health information de-identification policy alternatives,†in IHI, 2010, pp. 163–172.
[5] K. E. Emam, “Heuristics for de-identifying health data,†IEEE Security and Privacy, vol. 6, no. 4, pp. 58–61, 2008.
[6] P. Mell and T. Grance, “The NIST definition of cloud computing,†[Recommendations of the National Institute of Standards and TechnologySpecial Publication 800-145], 2011.
[7] R. Lu, H. Zhu, X. Liu, J. K. Liu, and J. Shao, “Toward efficient and privacy-preserving computing in big data era,â€IEEE Network, vol. 28, no. 4, pp. 46–50, 2014.
[8] K. Yang and X. Jia, “Expressive, efficient, and revocable data access control for multi-authority cloud storage,†IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1735–1744, July 2014.
[9] H. Li, D. Liu, K. Alharbi, S. Zhang, and X. Lin, “Enabling fine-grained access control with efficient attribute revocation and policy updating in smart grid,†KSII Transactions on Internet and Information Systems (TIIS), vol. 9, no. 4, pp. 1404–1423, 2015.
[10] K. Yang, Z. Liu, X. Jia, and X. S. Shen, “Time-domain attribute-based access control for cloud-based video content sharing: A cryptographic approach,†IEEE Trans. on Multimedia (to appear ), February 2016.
[11] B. Waters, “Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization,â€in Proc. of PKC’11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 53–70.
[12] H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,†in Proc. of INDOCRYPT’08. Springer, 2008, pp. 426–436.
[13] T. Nishide, K. Yoneyama, and K. Ohta, “Attribute-based encryption with partially hidden encryptor-specified access structures,†in applied cryptography and network security. Springer, 2008, pp. 111–129.
[14] J. Li, K. Ren, B. Zhu, and Z. Wan, “Privacy-aware attribute-based encryption with user accountability,†in Information Security. Springer, 2009, pp. 347–362.
[15] D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted data,†in Theory of cryptography. Springer, 2007, pp. 535–554.
[16] J. Katz, A. Sahai, and B. Waters, “Predicate encryption supporting disjunctions, polynomial equations, and inner products,†in Advances in Cryptology–EUROCRYPT’08. Springer, 2008, pp. 146–162.
[17] J. Lai, R. H. Deng, and Y. Li, “Fully secure cipertext-policy hiding cpabe,†in Information Security Practice and Experience. Springer, 2011, pp. 24–39.
[18] L. Lei, Z. Zhong, K. Zheng, J. Chen, and H. Meng, “Challenges on wireless heterogeneous networks for mobile cloud computing,†IEEE Wireless Communications, vol. 20, no. 3, pp. 34–44, 2013.
[19] K. Zheng, Z. Yang, K. Zhang, P. Chatzimisios, K. Yang, and W. Xiang, “Big data-driven optimization for mobile networks toward 5g,†IEEE Network, vol. 30, no. 1, pp. 44–51, 2016.
[20] Z. Su, Q. Xu, and Q. Qi, “Big data in mobile social networks: a qoeoriented framework,†IEEE Network, vol. 30, no. 1, pp. 52–57, 2016.
[21] H. Li, D. Liu, Y. Dai, and T. H. Luan, “Engineering searchable encryption of mobile cloud networks: when qoe meets qop,†IEEE Wireless Communications, vol. 22, no. 4, pp. 74–80, 2015.
-
Downloads
-
How to Cite
Barath, C., P, S., & Jahnavi . Y, R. (2018). An Efficient Scheme for Big Data Access with Privacy-preserving Policy in Cloud. International Journal of Engineering & Technology, 7(3.24), 445-448. https://doi.org/10.14419/ijet.v7i3.24.22790Received date: 2018-12-02
Accepted date: 2018-12-02