Shielding of Data Access Control for Multiauthority Cloud Storage Systems using Advanced Encryption Standard
Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 2)Publication Date: 2017-02-05
Authors : Abin K Ninan; Rex Benny; Soumya Sara Koshy;
Page : 316-320
Keywords : Access control; Revocation security; CP-ABE; Multiauthority cloud;
Abstract
Data access control for multiauthority cloud storage systems (DAC-MACS) is a beneficial way to ensure data security of the cloud storage system. The two main challenging issues of the current cloud storage systems are data outsourcing and untrusted cloud servers. The existing access control policies cannot be applied further as they either produce multiple encrypted copies of the same data or it requires a fully trusted cloud server. In DAC-MACS, there exist multiple attribute authorities which have the capabilities to issue its own attributes independently without any assistance. A new extensive data access control scheme (NEDAC-MACS) with multiple attribute authorities is used which will reduce the workload of a single Attribute Authority (AA). It achieves revocation security by the use of file token specified. Using this scheme the owners data can be accessed by users with the usage of the unique secret key alongside with ciphertext token issued by the admin. The uploaded data can be accessed by the users on the owners approval. In case if the owner uploads some inappropriate content, the users can report or flag to the server which leads to the blocking of the owner by the Certified Authority (CA). After the owner gets blocked after providing access control for the users, the data can be accessed further with the version key issued by the Attribute Authority and updated by admin as a new secret key and download the file. A 256 bit symmetric block cipher Advanced Encryption Standard (AES) encryption standard is used to enhance the security. AES is an assuring method that provides access control of encrypted data and provide more secure attribute revocation.
Other Latest Articles
- Bacteriological Analysis of Mineral Water and Drinking Water Supplies, in Mehsana, Gujarat
- A Review on DNA based Encryption and Steganography
- Asean Economic Community: Analysis of Bandung Creative City
- k-Odd Sequential Harmonious Labeling of Some Special Graphs
- Evaluation the Difference between Adult and Children for Some Salivary Elements
Last modified: 2021-06-30 17:48:27