Academia.eduAcademia.edu

Outline

Improving Data Sharing Security in Cloud Computing

2015

Abstract

Cloud computing has emerged as a new computing paradigm where all IT infrastructure can be outsourced and working as on premise. It offers numerous advantages both for customers and providers and especially at the cost level that is typically low compared to buying your own resources, configuring and managing them. One of the tremendous services is the data sharing and the data storage. Customers can outsource a huge number of data in cloud without having to worry about the capacity of memory or the size of data as cloud system manage the scalability of servers needed to contains your data. Cloud is flexible, scalable and dynamic so don't worry about capacities. But, one of the predominant concerns encountered in cloud and that can change your mind about this nice view, is security. As more and more sensitive data and personal information placed in the cloud, security concerns grow up. Building trust in providers it is not an easy task with an amount of outages and threats declared since adoption of cloud computing. In this paper, we give a new approach to enhance the security of data outsourced in cloud environment. The approach is based on Cipher Policy-Attribute Based Encryption (CP-ABE) scheme. It consists of encrypting data before outsourcing it and controlling the access to it by encryption. Our method offers scalability, flexibility and fine grained access control of data in cloud. Also, it provides an efficient manner to share confidential data on cloud servers.

References (13)

  1. S. Subashini, V.Kavitha, "A survey on security issues in service delivery models of cloud computing" Journal of Network and Computer Applications pp. 1-11, 2011.
  2. S. rehman, R. Gautam," Research on Access Control Techniques in SaaS of Cloud Computing" , SSCC 2014, CCIS 467, pp. 92-100, 2014.
  3. R.Aluvalu, L. Muddana, "A Survey on Access Control Models in Cloud Computing", Emerging ICT for Bridging the Future -Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1, pp 653-664, 2015.
  4. N. Meghanathan, "Review of access control models for cloud computing" Computer Science & Information Technology (CS & IT), pp 77-85, 2013.
  5. C. Lee, P. Chung, M. Hwang ," A survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments", International Journal of Network Security, Vol.15, No.4, PP.231-240, July 2013.
  6. M. Rasseena, G R. Harikrishnan, "Secure Sharing of Data over Cloud Computing using Different Encryption Schemes An overview", International Journal of Computing and Technology, Volume1, Issue 2, pp 8-11, 2014 .
  7. A.Sahai, B.Waters, "Fuzzy Identity-Based Encryption", Advances in Cryptology V EUROCRYPT, vol.3494 of LNCS, pp. 457-473, 2005.
  8. V.Goyal et al., "Attribute Based Encryption for Fine-Grained Access Control of Encrypted Data", ACM conference on Computer and Communicatios Security(ACM CCS),2006.
  9. J. Bethencourt et al., "Ciphertext-Policy Attribute-Based Encryption", IEEE Symposium on Security and Privacy(SP'07),2007.
  10. S.Gokuldev, S.Leelavathi, "HASBE: AHierarchical Attribute-Based Solution for Flexible and Scalable Access Control by Separate Encryption/Decryption in Cloud Computing", International Journal of Engineering Science and Innovative Technology(IJESIT), Volume 2, Issue 3, May 2013.
  11. G.Wang, Q.Liu, J.Wu, "Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Serrvices" , in Proceeding of ACM conference Computer and Communications Security (ACM CCS), Chicago, IL,2010.
  12. WAN, Zhiguo; LIU, June; and DENG, Huijie, Robert. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud ComputingIEEE Transactions on Information Forensics and Security (TIFS), pp. 743-754, 2012.
  13. Melissa Chase. Multi-authority Attribute Based Encryption. In TCC, volume 4392 of LNCS, pp. 515-534. Springer, 2007.