Prevention of Sensitive Information by Enhancing Cloud Access Control
Abstract
the scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication, and storage overheads are comparable to centralized approaches. To better protect data security, this paper makes the first attempt to formally address and which are centralized. The communication, computation access control scheme is decentralized and robust; unlike other access control schemes designed for clouds the problem of authorized data. Different from traditional existing systems, the differential privileges of users are further considered in duplicate check besides the data itself by encrypting the file with differential privilege keys. Unauthorized users cannot decrypt the cipher text even collude with the S-CSP. Security analysis of the definitions specified in the demonstrates that our system is secure in terms proposed security model.
Keywords
References
SushmitaRuj, Member, IEEE, Milos Stojmenovic, Member, IEEE, and Amiya Nayak, Senior Member, IEEE, “Decentralized Access Control with Anonymous Authentication of Data Stored in Cloudsâ€, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 2, February 2014.
S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds,†Proc. IEEE/ACM Int’l Symp.Cluster, Cloud and Grid Computing, pp. 556-563, 2012.
C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,†IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.-June 2012.
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy Keyword Search Over Encrypted Data in Cloud Computing,†Proc. IEEE INFOCOM, pp. 441-445, 2010.
S. Kamara and K. Lauter, “Cryptographic Cloud Storage,†Proc. 14th Int’l Conf. Financial Cryptography and Data Security, pp. 136-149, 2010.
H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-Based Authentication for Cloud Computing,†Proc. First Int’l Conf. Cloud Computing (Cloud Com), pp. 157-166, 2009.
C. Gentry, “A Fully Homomorphic Encryption Scheme,†PhD dissertation, Stanford Univ., http://www.crypto. stanford.edu/ craig, 2009.
A.-R. Sadeghi, T. Schneider, and M. Winandy, “Token-Based Cloud Computing,†Proc. Third Int’l Conf. Trust and Trustworthy Computing (TRUST), pp. 417-429, 2010.
R.K.L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang, and B.S. Lee, “Trust cloud: A Framework for Accountability and Trust in Cloud Computing,†HP Technical Report HPL-2011-38, http://www.hpl.hp.com/techreports/ 2011/HPL-2011-38.html, 2013.
R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing,†Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 282-292, 2010.
D.F. Ferraiolo and D.R. Kuhn, “Role-Based Access Controls,†Proc. 15th Nat’l Computer Security Conf., 1992.
D.R. Kuhn, E.J. Coyne, and T.R. Weil, “Adding Attributes to Role-Based Access Control,†IEEE Computer, vol. 43, no. 6, pp. 79-81, June 2010.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â