Downloads: 117 | Views: 249
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015 | Popularity: 7 / 10
Decentralized Firewall for Attribute-Based Encryption with Verifiable and Revocable Cloud Access Control
Shintomon Mathew, George T. Vadakkumcheril, T. Justin Jose
Abstract: The most difficult issues in data outsourcing are the requirement of authorization policies and the revocation of policy updates. In all current Ciphertext-Policy Attribute-Based Encryption (CP-ABE) schemes, it is expected that there is an Attribute Authority (AA) in the system to issuing attributes to the users. CP-ABE is a promising cryptographic answer for these issues for authorizing access control approaches characterized by a data owner on outsourced data. Be that as it may, it is hard to specifically apply existing CP-ABE plans to data access control for cloud storage frameworks on account of the attribute revocation issue. In numerous applications, there are various authorities exist together in a framework and every authority has the capacity to issue attributes independently. In this paper, we outline an access control structure for multi-authority frameworks and propose an efficient and secure multi-authority access control scheme for cloud storage. We first outline an efficient multi-authority CP-ABE scheme that does not oblige a global authority and can bolster any Linear Secret Sharing Scheme (LSSS) access structure. At that point, we demonstrate its security in the random oracle model. In particular, we propose a revocable multi-authority CP-ABE scheme, and apply it as the fundamental systems to outline the data access control scheme. The analysis results show that the proposed multi-authority access control scheme is scalable, efficient and secure in the data outsourcing systems.
Keywords: Access Control, Multi-Authority, CP-ABE, Attribute Revocation, Cloud Storage, Data Sharing, Decryption Outsourcing, Verifiability, Multi-receiver Identity-based Encryption
Edition: Volume 4 Issue 10, October 2015
Pages: 165 - 173
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 11, November 2024
Pages: 844 - 850Data-Driven Decision Making: Advanced Database Systems for Business Intelligence
Maria Anurag Reddy Basani, Anudeep Kandi
Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 1816 - 1822Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing
Pushpjeet Cholkar, Dr. Margi Patel
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Student Project, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023
Pages: 306 - 309A Basic Framework for Policy Updates for the Outsourced Exchange of Private Medical Records
V. Jayaganesh
Downloads: 68
Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021
Pages: 61 - 70Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution
Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga