Multi-authority Cloud Storage by Using Efficient Revocation in Two- Circumstance Data Access Management

نویسنده

  • Ramini Kiranmai
چکیده

Side-channel investigation (SCA) misuses the data spilled through unexpected yields (e.g., control utilization) to uncover the mystery key of cryptographic modules. The genuine danger of SCA lies in the capacity to mount assaults over little parts of the key and to total data over various encryptions. The danger of SCA can be foiled by changing the mystery key at each run. To be sure, numerous commitments in the area of spillage strong cryptography attempted to accomplish this objective. Be that as it may, the proposed arrangements were computationally escalated and were not intended to take care of the issue of the current cryptographic plans. In this paper, we propose a non specific structure of lightweight key refreshing that can ensure the current cryptographic principles and assess the base necessities for heuristic SCA-security. At that point, we propose a total answer for ensure the usage of any standard method of Cutting edge Encryption Standard. Our answer keeps up a similar level of SCA-security (and at times better) as the best in class, at an irrelevant zone overhead while multiplying the throughput of the best past work.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

User Revocation Based Anonymous Access Provision for Efficient Cloud User Privacy

Cloud computing is a recent technology provides a flexible, on-demand and low cost feature of computing resources. The Main issue in Cloud Computing is user identity privacy and data content privacy. The User Privacy in Cloud Computing is achieved by various data access control Schemes. Existing Fully Anonymous Access control scheme with decentralized attribute authority provides data content p...

متن کامل

A Lterature Survey on Revocable Multiauthority Cipher Text-policy Attribute-based Encryption (cp-abe) Scheme for Cloud Storage

In a Cloud Computing the data security achieved by Data Access Control Scheme. Cipher text-Policy Attribute-based Encryption (CP-ABE) is considered as one of the most suitable scheme for data access control in cloud storage. This scheme provides data owners more direct control on access policies. However, CP-ABE schemes to data access control for cloud storage systems are difficult because of t...

متن کامل

Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation

Nowadays, more and more users store their data in cloud storage servers for great convenience and real benefits offered by the service, so cloud data storage becomes one of the desirable services provided by cloud service providers. Multi-Authority Ciphertext-Policy Attribute-Based Encryption (MA-CP-ABE) is an emerging cryptographic solution to data access control for large-scale collaborative ...

متن کامل

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

Data access control is an efficient way to make sure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners mor...

متن کامل

TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems

Data access control is an effective way to ensure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-based Encryption (CP-ABE), as a promising technique for access control of encrypted data, is very suitable for access control in cloud storage systems due t...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017