Secure Data Storage in Cloud by Decentralized Access Control

Cloud computing is recently developed new emerging technology for complex systems with massive-scale services sharing among numerous users, where user can rent the storage and computing resources of server provided by a company. Users only require a terminal, a smart phone or tablet connected to the internet. Cloud can store huge amount of data, so the mobile users do not have to carry their data. Therefore, security of data, privacy of user and authentication of both users and services is a significant issue for the trust and security of cloud computing. In order to achieve safe storage, we proposed a secure cloud storage scheme providing access to the data using RSA publickey encryption algorithm and digital signature scheme. In this scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. Access control feature is also added by which only a valid users are able to decrypt the stored information. This scheme also prevents replay attack and supports creation, modification, and reading data stored in cloud. Time based user Revocation scheme is also used. Also we compared performance of our system with the 3DES system on the basis of encryption and decryption of data.

[2]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[3]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[4]  Manoj Prabhakaran,et al.  Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance , 2008, IACR Cryptol. ePrint Arch..

[5]  Sushmita Ruj,et al.  Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).

[6]  Sushmita Ruj,et al.  Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2014, IEEE Transactions on Parallel and Distributed Systems.

[7]  Jie Wu,et al.  Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.

[8]  Cong Wang,et al.  Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.

[9]  Matthew Green,et al.  Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.

[10]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[11]  Kouichi Sakurai,et al.  Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems , 2011, ISPEC.

[12]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[13]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[14]  Levent Ertaul,et al.  Security Challenges in Cloud Computing , 2010, Security and Management.

[15]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[17]  Prateek Mittal,et al.  EASiER: encryption-based access control in social networks with efficient revocation , 2011, ASIACCS '11.

[18]  Ivan Stojmenovic,et al.  DACC: Distributed Access Control in Clouds , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[19]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[20]  Manoj Prabhakaran,et al.  Attribute-Based Signatures , 2011, CT-RSA.