International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 142

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 2, February 2017


Shielding of Data Access Control for Multiauthority Cloud Storage Systems using Advanced Encryption Standard

Abin K Ninan | Rex Benny | Soumya Sara Koshy [2]


Abstract: Data access control for multiauthority cloud storage systems (DAC-MACS) is a beneficial way to ensure data security of the cloud storage system. The two main challenging issues of the current cloud storage systems are data outsourcing and untrusted cloud servers. The existing access control policies cannot be applied further as they either produce multiple encrypted copies of the same data or it requires a fully trusted cloud server. In DAC-MACS, there exist multiple attribute authorities which have the capabilities to issue its own attributes independently without any assistance. A new extensive data access control scheme (NEDAC-MACS) with multiple attribute authorities is used which will reduce the workload of a single Attribute Authority (AA). It achieves revocation security by the use of file token specified. Using this scheme the owners data can be accessed by users with the usage of the unique secret key alongside with ciphertext token issued by the admin. The uploaded data can be accessed by the users on the owners approval. In case if the owner uploads some inappropriate content, the users can report or flag to the server which leads to the blocking of the owner by the Certified Authority (CA). After the owner gets blocked after providing access control for the users, the data can be accessed further with the version key issued by the Attribute Authority and updated by admin as a new secret key and download the file. A 256 bit symmetric block cipher Advanced Encryption Standard (AES) encryption standard is used to enhance the security. AES is an assuring method that provides access control of encrypted data and provide more secure attribute revocation.


Keywords: Access control, Revocation security, CP-ABE, Multiauthority cloud


Edition: Volume 6 Issue 2, February 2017,


Pages: 316 - 320


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Abin K Ninan, Rex Benny, Soumya Sara Koshy, "Shielding of Data Access Control for Multiauthority Cloud Storage Systems using Advanced Encryption Standard", International Journal of Science and Research (IJSR), Volume 6 Issue 2, February 2017, pp. 316-320, https://www.ijsr.net/get_abstract.php?paper_id=ART2017684

Similar Articles with Keyword 'Access control'

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [12] | R. Sathya [8]

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 12, December 2024

Pages: 448 - 453

Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies

Dr. A. Lavanya

Share this Article
Top