Open Access Open Access  Restricted Access Subscription Access

A Novel Approach Towards Time Sensitive Data

Dr Piyush Kumar Pareek, Chaitra Y R, Saumya L

Abstract


Privacy and confidentiality of data stored in public cloud have been a major issue since cloud storage first came up. Various technologies have been used to protect the data in the cloud. It is an issue in relation to cloud storage. It frees information owners because he has no responsibility of providing information to any expected clients. Hence the need for consistent surveillance and constant security practices. To preserve the integrity of the data, researchers have proposed multiple methods to ensure data security. In any case, until this time, no plans to intensify both fine-grain ability to control and possible control. In this project, client and author ("the evil dictator") are not able to access the data without the client's use of a given secret key. Another enhanced feature is being highlighted here where a technical back up account can grant access to data users. The CPABE policy has been adapted for the storage of private electronic data.


Full Text:

PDF

References


Wan, Z., & Deng, R. H. (2011). HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE transactions on information forensics and security, 7(2), 743-754.

Yang K., Jia X., Ren X., Zhang B., Xie, R.(2013). DACMACS: Effective data access control for multi-authority cloud storage systems. Transactions on Information Forensics and Security,8(2),1790–1801.

Bertino, E., Bonatti, P. A., & Ferrari, E. (2001). TRBAC: A temporal role-based access control model. ACM Transactions on Information and System Security (TISSEC), 4(3), 191-233..

Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2012). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), 131-143.

Zhou, Z., Zhang, H., Zhang, Q., Xu, Y., & Li, P. (2014, December). Privacy-preserving granular data retrieval indexes for outsourced cloud data. In 2014 IEEE Global Communications Conference (pp. 601-606). IEEE.

Liu, Q., Tan, C. C., Wu, J., & Wang, G. (2011, December). Reliable re-encryption in unreliable clouds. In 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011 (pp. 1-5). IEEE.

Bethencourt, J., Sahai, A., & Waters, B. (2007, May). Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP'07) (pp. 321-334). IEEE.

Boneh, D., & Franklin, M. (2001, August). Identity-based encryption from the Weil pairing. In Annual international cryptology conference (pp. 213-229). Springer, Berlin, Heidelberg.

Yuan, K., Liu, Z., Jia, C., Yang, J., & Lv, S. (2013, September). Public key timed-release searchable encryption. In 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (pp. 241-248). IEEE.

Liu, Q., Wang, G., & Wu, J. (2014). Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Information sciences, 258, 355-370.


Refbacks

  • There are currently no refbacks.