Title: Secure Data Sharing In Cloud Computing By Implementing Amednded Attribute Based Data Sharing Scheme

Author(s): M.Karthikraj1, S.Arunkumar2, M.Muralikrishnan3


1PG Student, Dept. of Computer Science and Engineering, SRM University, Ramapuram, Chennai, Tamilnadu, India.

This email address is being protected from spambots. You need JavaScript enabled to view it.

2Assistant Professor, Dept. of Computer Science and Engineering, SRM University, Ramapuram

Chennai, Tamilnadu, India,

2arunkumarThis email address is being protected from spambots. You need JavaScript enabled to view it.

3PG Student, Dept. of Computer Science and Engineering, SRM University, Ramapuram, Chennai, Tamilnadu, India.

3This email address is being protected from spambots. You need JavaScript enabled to view it.
 
              

Abstract

Cloud computing, is a booming computing paradigm, allowing users to remotely hoard their data in a server and provide services on-demand. To ensure the data security in the cloud, Data access control is an efficient approach.  the data access control turn out to be a challenging issue in cloud storage systems due to data outsourcing and despaired cloud service providers. Cipher text-Policy Attribute based Encryption (CP-ABE) is regarded as one of the most suitable technologies in cloud storage for data access control, since it gives data owners more undeviating control on access policies. However, it is complicated to directly employ existing CP-ABE schemes to data access control for cloud storage systems due to the attribute revocation issue. A data owner (DO) is generally willing to store huge amounts of data in cloud storage system for saving the cost on local data management. Without any of the data security mechanism, The cloud service provider (CSP), however, can completely gain access to all data of the user. Data owner is permitted to fully regulate the access policy correlated with the data which has to be disclosed. However, CP-ABE is limited to a potential security risk that is known as key escrow problem whereby the secret keys was issued by a trusted key authority to the users. In the proposed system, attribute-based data sharing scheme is revisited in order to solve the issue of “key escrow” and  also to improve the persuasiveness of attribute, so that the resultant scheme is more gracious to the application that are implemented through cloud computing. An improved two-party key issuing protocol has been implemented that which assure that neither key authority nor cloud service provider can be conceded the whole secret key of a individual user


License: This work is licensed under a Creative Commons Attribution 4.0 International License.

 

Website: http://www.ijecs.in

e-ISSN:  2319-724

Call For Paper

VOLUME 06. ISSUE 05 [May 2017]

IJECS invites authors to submit manuscripts Reporting original engineering research, computer science , original article, research article, case report, systematic reviews, or educational Innovations for publication for the Current issues. Types of manuscripts suitable for IJECS include: Engineering Science, Computer Science, Educational Innovation, Brief Report, Reviews on Teaching In keeping with high quality scholarship

Read More

Online Submission

If any difficulty you can also submit to: This email address is being protected from spambots. You need JavaScript enabled to view it..in

GettyImages.pngace.pngajd.pngarx.pngcit.pngcomp.pngcross.pngicn.pngino.pnglogo_wcmasthead_en.pngres.pngresbib.pngsci.pngscic.pngscics.pngsearch_logo.gifulrich.pngur.png

FaceBook

About Us

The“International Journal of Engineering  and computer science”(IJECS™) is an international online journal in English published monthly. The aim of IJECS is to publish peer reviewed research and review articles in rapidly developing field of engineering science and technology

Address

Address : LIG 73 megdoot Nagar Mandsaur

State : Madhya Pradesh

Country : INDIA

Phone :+91 (822) 260 24 694

Email: editor@ijecs.in

Go to top