Framework for Security of Shared Data in Cloud Environment

被引:0
作者
Shaikh, Aaysha [1 ]
Gadge, Jayant [2 ]
机构
[1] Thadomal Shahani Engn Coll, Comp Engn ME, Bombay, Maharashtra, India
[2] Thadomal Shahani Engn Coll, Comp Engn Dept, Bombay, Maharashtra, India
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA) | 2016年
关键词
Privacy Preservation; Cipher-text Attribute Based Encryption; Revocation handling; dynamic group key; Cloud Environment;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The data security in cloud computing is formidable task. The privacy of shared data and its integrity in untrusted public environment is highly subject to skepticism. Many approaches have been designed to audit cloud data. However issues with existing mechanism are weak authorization and access data control which is also a threat to identity privacy in dynamic group environment. In this paper a new framework is proposed for securing privacy and identity of owner and its data. This framework is referred as Privacy Preserving Authentication Privilege Access Data Integrity (PP-APADI). It leverages the enhance identity management using two factor authorization and enforced fine grained privilege access control in shared pool of resources. It uses Cipher-text Attribute Based Encryption (CP-ABE) for anonymous data access control. Besides random dynamic group key signature and efficient revocation handling mechanism is used to dual the security layer. This combined approach helps public auditing in cloud data without exploiting privacy of owner to public verifier. It also supports file sharing, recovery and replacement in a multi-tenant dynamic group environment.
引用
收藏
页数:6
相关论文
共 18 条
[1]  
[Anonymous], 1993, CRYPTO, DOI DOI 10.1007/3-540-48329-2
[2]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[3]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]  
Baden R., 2009, P ACM SIGCOMM 09 AUG
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]  
Goyal V., 2006, 13 ACM CONFCOMPUT CO, P89, DOI DOI 10.1145/1180405.1180418
[7]   Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems [J].
Hur, Junbeom ;
Noh, Dong Kun .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) :1214-1221
[8]  
Ibraimi L, 2009, LECT NOTES COMPUT SC, V5932, P309, DOI 10.1007/978-3-642-10838-9_23
[9]  
Kallahalla M, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 2ND USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES (FAST'03), P29
[10]   Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud [J].
Liu, Xuefeng ;
Zhang, Yuqing ;
Wang, Boyang ;
Yan, Jingbo .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (06) :1182-1191