Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control

نویسندگان

  • Shivarathri Ravinder
  • B. Sarada
چکیده

now a days, plenty of users area unit storing their data’s in cloud, as a result of it provides storage flexibility. However the most drawbacks in cloud are information security. Cipher text-Policy Attribute-based cryptography (CP-ABE) is thought to be one among the foremost appropriate technologies for information access management in cloud storage; as a result of it offers information house owners a lot of direct management on access policies. During this work to propose an information access management for multiauthority for substantiating the integrity of AN un-trusted and outsourced storage by third party auditor. Additionally, this project proposes methodology primarily based on probabilistic question and periodic verification for up the performance of audit services. It ensures potency of security by protective from unauthorized users. These experimental results not solely validate the effectiveness of those approaches; however conjointly show our audit system verifies the integrity with lower computation overhead and requiring less additional storage for audit data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lterature Survey on Revocable Multiauthority Cipher Text-policy Attribute-based Encryption (cp-abe) Scheme for Cloud Storage

In a Cloud Computing the data security achieved by Data Access Control Scheme. Cipher text-Policy Attribute-based Encryption (CP-ABE) is considered as one of the most suitable scheme for data access control in cloud storage. This scheme provides data owners more direct control on access policies. However, CP-ABE schemes to data access control for cloud storage systems are difficult because of t...

متن کامل

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

Data access control is an efficient way to make sure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners mor...

متن کامل

User Revocation Based Anonymous Access Provision for Efficient Cloud User Privacy

Cloud computing is a recent technology provides a flexible, on-demand and low cost feature of computing resources. The Main issue in Cloud Computing is user identity privacy and data content privacy. The User Privacy in Cloud Computing is achieved by various data access control Schemes. Existing Fully Anonymous Access control scheme with decentralized attribute authority provides data content p...

متن کامل

Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation

Nowadays, more and more users store their data in cloud storage servers for great convenience and real benefits offered by the service, so cloud data storage becomes one of the desirable services provided by cloud service providers. Multi-Authority Ciphertext-Policy Attribute-Based Encryption (MA-CP-ABE) is an emerging cryptographic solution to data access control for large-scale collaborative ...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015