Rate the Article: Decentralized Firewall for Attribute-Based Encryption with Verifiable and Revocable Cloud Access Control, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 117 | Views: 337

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015 | Rating: 7 / 10


Decentralized Firewall for Attribute-Based Encryption with Verifiable and Revocable Cloud Access Control

Shintomon Mathew, George T. Vadakkumcheril, T. Justin Jose


Abstract: The most difficult issues in data outsourcing are the requirement of authorization policies and the revocation of policy updates. In all current Ciphertext-Policy Attribute-Based Encryption (CP-ABE) schemes, it is expected that there is an Attribute Authority (AA) in the system to issuing attributes to the users. CP-ABE is a promising cryptographic answer for these issues for authorizing access control approaches characterized by a data owner on outsourced data. Be that as it may, it is hard to specifically apply existing CP-ABE plans to data access control for cloud storage frameworks on account of the attribute revocation issue. In numerous applications, there are various authorities exist together in a framework and every authority has the capacity to issue attributes independently. In this paper, we outline an access control structure for multi-authority frameworks and propose an efficient and secure multi-authority access control scheme for cloud storage. We first outline an efficient multi-authority CP-ABE scheme that does not oblige a global authority and can bolster any Linear Secret Sharing Scheme (LSSS) access structure. At that point, we demonstrate its security in the random oracle model. In particular, we propose a revocable multi-authority CP-ABE scheme, and apply it as the fundamental systems to outline the data access control scheme. The analysis results show that the proposed multi-authority access control scheme is scalable, efficient and secure in the data outsourcing systems.


Keywords: Access Control, Multi-Authority, CP-ABE, Attribute Revocation, Cloud Storage, Data Sharing, Decryption Outsourcing, Verifiability, Multi-receiver Identity-based Encryption


Edition: Volume 4 Issue 10, October 2015,


Pages: 165 - 173



Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments (Only high quality comments will be accepted.)

Characters: 0

Your Full Name:


Your Valid Email Address:


Verification Code will appear in 2 Seconds ... Wait

Top