Preview

Efficient Method for Re-Encryption in Unreliable Clouds Using R3 Algorithm

Powerful Essays
Open Document
Open Document
2334 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Efficient Method for Re-Encryption in Unreliable Clouds Using R3 Algorithm
Efficient Method for Re-encryption in Unreliable Clouds Using R3 Algorithm

Abstract— Aim of the project is to re-encrypt the data and revoke the access rights from the users. In this paper, we propose an efficient data retrieval scheme using attribute-based encryption. The proposed scheme is best suited for cloud storage systems with substantial amount of data. It provides rich expressiveness as regards access control and fast searches with simple comparisons of searching entities. The proposed scheme also guarantees data security end-user privacy during the data retrieval process. A key approach to secure cloud computing is for the data owner to store encrypted data in the cloud, and issue decryption keys to authorized users. The cloud storage based information retrieval service is a promising technology that will form a vital market in the near future. Although there have been copious studies proposed about secure data retrieval over encrypted data in cloud services, most of them focus on providing the strict security for the data stored in a third party domain. However, those approaches require astounding costs centralized on the cloud service provider, this could be a principal hindrance to achieve efficient data retrieval in cloud storage.

Keywords— Attribute-based encryption, cloud computing, Proxy re-encryption.

I. Introduction

Cloud computing, which gets its name as a representation for the Internet [1], is becoming a popular term and has been used by an increasing number of organizations. In cloud computing environment, services are not provided by a single server or a small group of servers; instead, various computing and storage services are provided by some collection of data centers owned and maintained by a third party.

Cloud infrastructures can be roughly categorized as either private or public. In a private cloud, the infrastructure is managed and owned by the customer and



References: [1]S. Kamara and K. Lauter, “Cryptographic cloud storage,” Financial Cryptography and Data Security, 2010. [2]M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, “A view of cloud Computing,” Communications of the ACM, 2010. [3]A. Sahai and B. Waters, “Fuzzy identity-based encryption,” Advances in Cryptology–EUROCRYPT, 2005. [4]V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. of ACM 2006. [5]J. Bethencourt, A. Sahai, and B. Waters, “Cipher text-policy attribute-based encryption,” in Proc. of IEEE Symposium on S&P, 2007. [6]M. Blaze, G. Bleumer, and M. Strauss, “Divertible protocols and atomic proxy cryptography,” Advances in Cryptology–EUROCRYPT, 1998. [7]A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in Proc. of ACM CCS, 2008. [8]G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,” in Proc. of ACM CCS (Poster), 2010. [9]S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. of IEEE [10]S.Satyanarayana, T.Gopikiran, B.Rajkumar. “Cloud Business Intelligence” international journal of advanced and innovative research (ijair) volume 1 issue 6, 2012.

You May Also Find These Documents Helpful

  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Good Essays

    References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning…

    • 575 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Cis 500- Cloud Computing

    • 1078 Words
    • 5 Pages

    Technology has taken great leaps of advancement. Some of the new technology that companies and consumers are taking advantage of to store and process data is cloud computing. Cloud computing was derived from virtualization. Virtualization allows companies to separate business applications from hardware. Doing this gives the company the capability of assigning applications as needed. The option to manage applications is a great benefit to companies. Resulting from the virtualization error, cloud computing has emerged to provide flexible IT infrastructures. This has not only enhanced the options companies now have, but it is also proven to be more cost efficient. This has increasingly become a preferred method of companies and consumers alike. (Turban, & Volonino, 2011, p.47)…

    • 1078 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Cited: Ballad, B. B. (2011). Access Control, Authentication, and Public Key Infrastructure. Burlington: Jones & Bartlett Learning.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Powerful Essays

    They are numerous protocols and standards that are used for communications over networks. But only a few protocols are cryptographic in nature. Cryptographic protocols provide secure communication between two communicating entities over the insecure network. Cryptographic protocols use either symmetric or asymmetric or a combination of both the algorithm to secure the communication channel. Presented in this paper are various cryptographic protocols that provide encryption to data in transit.…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Inf 103: Computer Literacy

    • 1963 Words
    • 8 Pages

    The national Institute of Standards and Technology under the department of Commerce defines Cloud Computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”. Another definition for cloud computing is a term used to describe a network of computers that deliver information technology services over the internet to many users in an on-demand environment (P.Y. Thomas 2011). As you can see by the definitions above the term Cloud Computing has been defined, yet many of us are barely getting to understand how this type of computing affects the work we do both in our personal life and in the workplace. In the following pages you will see how cloud computing is the way of the future without it being limited to business applications; furthermore creating a niche in the social media/personal computing we do on a daily basis.…

    • 1963 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Business Trend Memo

    • 1299 Words
    • 6 Pages

    Hayes, B. (2008, March), “Cloud computing”, Communications of the ACM, 51, 9-11. Retrieved from http://cacm.acm.org/magazines/2008/7/5368-cloud-computing/fulltext…

    • 1299 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Performance Management Memo

    • 2427 Words
    • 10 Pages

    Traci, here is the performance management framework that you asked for, which I recommend to Landslide Limousine.…

    • 2427 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    The historical novel, a Tale of Two Cities by Charles Dickens takes place in England and France around the time of the French Revolution. It follows two families, the Manettes and the Defarges. Both families have a connection with Charles Darnay, a man who left his aristocratic family to live a normal life. Both families’ relationship with Darnay leads the families together in France during the revolution to cause deadly results. Dickens uses the oppression of the revolutionaries to indicate that living with darkness and suffering for so long leads people so far from the light of humanity that all they see and know is darkness and cruelty.…

    • 1114 Words
    • 5 Pages
    Good Essays
  • Better Essays

    The main contribution of the paper is that Airavat builds on mandatory access control (MAC) and differential privacy to ensure untrusted MapReduce computations on sensitive data do not leak private information and provide confidentiality, integrity, and privacy guarantees. The goal is to prevent malicious computation providers from violating privacy policies a data provider imposes on the data to prevent leaking information about individual items in the data. The system is implemented as a modification to MapReduce and the Java virtual machine, and runs on top of SELinux…

    • 762 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Existing technical approaches for preserving the priva-cy of datasets stored in cloud mainly include encryption and anonymization. On one hand, encrypting all datasets, a straightforward and effective approach, is widely adopted in current research . However, processing on encrypted datasets efficiently is quite a challenging task, because most existing applications only run on unencrypted datasets. However, preserving the privacy of intermediate datasets becomes a…

    • 895 Words
    • 4 Pages
    Good Essays
  • Better Essays

    E.F. Brickell (Ed.): Advances in Cryptology - CRYPT0 '92, LNCS 740, pp. 487-496, 1993. 0 Springer-Verlag Berlin Heidelberg 1993…

    • 4403 Words
    • 18 Pages
    Better Essays
  • Powerful Essays

    Access to the data can be enforced through many access control models e.g. Attribute-Base Access Control(ABAC),…

    • 1572 Words
    • 7 Pages
    Powerful Essays

Related Topics