DESIRABLE SOLUTION TO UPDATE THE ENCRYPTED DATA IN OPEN NETS

Chevuru Kavitha, B Bhaskar

Abstract


Attribute-Based File encryption (ABE) is really a promising technique to guarantee the finish-to-finish security of massive data within the cloud. Within this paper, we advise a manuscript plan that enabling efficient access control with dynamic policy updating for giant data within the cloud. However, the insurance policy updating happens to be a frightening issue when ABE can be used to create access control schemes. An insignificant implementation would be to let data proprietors retrieve the information and re-secure it underneath the new access policy, after which send it to the cloud. Because of the high volume and velocity of massive data, it's an effective choice to store big data within the cloud, because the cloud has abilities of storing big data and processing high amount of user access demands. This process, however, incurs a higher communication overhead and high computation burden on data proprietors. We concentrate on developing an outsourced policy updating way of ABE systems. Our method can steer clear of the transmission of encrypted data and reduce the computation work of information proprietors, by utilizing the formerly encrypted data with old access policies. Furthermore, we propose policy updating algorithms for various kinds of access policies. Case study implies that our policy updating outsourcing plan is true, complete, safe and effective. Finally, we advise a competent and secure way in which enables data owner to check on if the cloud server has updated the cipher texts properly.


Keywords


Policy Updating; Outsourcing; Access Control; ABAC; ABE; Big Data; Cloud

References


A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, “Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,” in EUROCRYPT’10. Springer, 2010, pp. 62–91.

K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, “DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems,” IEEE Trans. Info. Forensics Security, vol. 8, no. 11, pp. 1790–1801, 2013.

A. Beimel, “Secure schemes for secret sharing and key distribution,” DSc dissertation, 1996.

K. Yang and X. Jia, “Attributed-based access control for multi-authority systems in cloud storage,” in ICDCS’12. IEEE, 2012, pp. 1–10.

A. Sahai, H. Seyalioglu, and B. Waters, “Dynamic credentials and cipher text delegation for attribute-based encryption,” in CRYPTO’12. Springer, 2012, pp. 199–217.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.