Survey on Two Layer Encryption System

Security and privacy are the major concern in the adoption of cloud technologies for the data storage purpose. To reduce these concerns one can use the encryption process. However, whereas encryption assures confidentiality of the data against the cloud, but encryption is not sufficient to support the enforcement of fine-grained organizational access control policies (ACPs). Under this approach, data owner can encrypt data before uploading on the cloud and re-encrypt it whenever user credentials are changed. Thus data owners have to pay high communication and computation cost. To overcome this issue, Two Layer Encryption (TLE) process is proposed to delegate the enforcement of fine-grained access control to the cloud. In this system, data owner performs a coarse-grained encryption and cloud performs fine-grained encryption. The TLE system is the NP-complete. This system assures the confidentiality of the data and preserves the privacy of users from the cloud.

[1]  Dan Suciu,et al.  Controlling Access to Published Data Using Cryptography , 2003, VLDB.

[2]  Wen-Tsuen Chen,et al.  Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..

[3]  Elisa Bertino,et al.  Privacy Preserving Delegated Access Control in Public Clouds , 2014, IEEE Transactions on Knowledge and Data Engineering.

[4]  Elisa Bertino,et al.  Towards privacy preserving access control in the cloud , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[5]  Elisa Bertino,et al.  A privacy-preserving approach to policy-based content dissemination , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[6]  Elisa Bertino,et al.  Privacy preserving delegated access control in the storage as a service model , 2012, 2012 IEEE 13th International Conference on Information Reuse & Integration (IRI).

[7]  Elisa Bertino,et al.  Secure and selective dissemination of XML documents , 2002, TSEC.

[8]  Yacine Challal,et al.  Group Key Management Protocols: A Novel Taxonomy , 2008 .

[9]  Sushil Jajodia,et al.  Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.

[10]  Elisa Bertino,et al.  A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[11]  Elisa Bertino,et al.  Privacy Preserving Policy-Based Content Sharing in Public Clouds , 2013, IEEE Transactions on Knowledge and Data Engineering.

[12]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.