A Framework with Ciphertext Attribute-Based encryption for data security in the cloud

Security of outsourced data is the primary concern in the cloud computing environment. Cloud can be made more credible and admissible by effective implementation of access control, confidentiality, integrity, and data recovery. In this paper, first discussed practical cryptographic approaches, and then analyze Cipher Text Attribute Based Encryption (CPABE) under security challenges, access control, revocation, and application. Also, proposed a framework with implementation, which is based on multiple attributes authorities to ensure the safety and privacy of data. Here CPABE, Advanced Encryption Standard (AES), proxy server, Proof of Reliability (POR) and Third Party Auditor (TPA) are jointly used to attain access control, confidentiality, reduced user's overhead, data backup, and integrity checks respectively.

[1]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[2]  Chin-Lung Hsu,et al.  Factors affecting the adoption of cloud services in enterprises , 2015, Information Systems and e-Business Management.

[3]  Cristiana Santos,et al.  Property and the cloud , 2017, Comput. Law Secur. Rev..

[4]  Syam Kumar Pasupuleti,et al.  Attribute based encryption in cloud computing: A survey, gap analysis, and future directions , 2018, J. Netw. Comput. Appl..

[5]  Hai Jiang,et al.  Survey of attribute based encryption , 2014, 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[6]  Miguel Morales-Sandoval,et al.  DET-ABE: A Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption , 2015, WISTP.

[7]  Xiang-Yang Li,et al.  Privacy preserving cloud data access with multi-authorities , 2012, 2013 Proceedings IEEE INFOCOM.

[8]  Chen Li,et al.  A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT , 2018, IEEE Access.

[9]  Hesham F. A. Hamed,et al.  Advanced Encryption Standard Algorithm: Issues and Implementation Aspects , 2012, AMLTA.

[10]  Hideki Imai,et al.  Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes , 2009, IMACC.

[11]  Wei Li,et al.  TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage , 2016, IEEE Transactions on Parallel and Distributed Systems.

[12]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[13]  Elaine B. Barker,et al.  Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies , 2016 .

[14]  Mohamed Jmaiel,et al.  Privacy in cloud computing environments: a survey and research challenges , 2017, The Journal of Supercomputing.

[15]  Yuto Lim,et al.  A survey on Proof of Retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends , 2018, J. Netw. Comput. Appl..

[16]  Xiaohua Jia,et al.  DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems , 2013, IEEE Transactions on Information Forensics and Security.