A model based on cloud computing wherein data
is being accessed from the cloud and through the internet
without any direct affiliation to the server. The services of
cloud can be accessed as long as the internet service is
accessed. In this paper, survey on many schemes like Key-
Policy Attribute-Based coding, Cipher text- Policy Attribute-
Based coding, Cipher text Policy Attribute Set primarily
based coding, Fuzzy Identity-Based coding, gradable
Identity-Based coding, gradable Attribute-Based Encryption
and gradable Attribute-Set-Based Encryption for access
management of outsourced information are mentioned.
Shraddha Deshmukh : is currently in the final year of degree
course of bachelor of engineering from Rajiv Gandhi College of
engineering and Research, Wanadongri, Nagpur under
Rashtrasant Tukdoji Maharaj Nagpur University.
Prutha Sontakke : is currently in the final year of degree course of
bachelor of engineering from Rajiv Gandhi College of engineering
and Research, Wanadongri, Nagpur under Rashtrasant Tukdoji
Maharaj Nagpur University.
Mithil Wasnik : the guide and lecturer in Rajiv Gandhi
College of engineering and Research, Wanadongri, Nagpur under
Rashtrasant Tukdoji Maharaj Nagpur University.
Cloud Computing, Data Confidentiality, Fine-
Grained Access Control.
This paper discusses the cloud storage system and the
encryption techniques elaborately. Encryption techniques
with makes the storage system more secure and as well as
scalable. Implementation of an encryption system on the
cloud storage is been done in order to achieve minimum
storage and computation cost that provides the necessary
impetus for research. Combination of centralized and
decentralized storage systems existed in organizations.
[1] M. Nelson, “Building an Open Cloud,” Science. vol. 34
no. 5935 pp. 1656–1657, June 2009.
[2] V. Goyal, O. Pandey, A. Sahai, and B.Waters,
“Attibute-based encryption for fine-grained access
control of encrypted data,” in Proc. ACM Conf.
Computer and Communications Security (ACM CCS),
Alexandria, VA, 2006.
[3] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertextpolicy
attribute based encryption,” in Proc. IEEE
Symp. Security and Privacy, Oakland, CA, 2007.
[4] R. Bobba, H. Khurana, and M. Prabhakaran,
“Attribute-sets: A practically motivated enhancement
to attribute-based encryption,” in Proc. ESORICS,
Saint Malo, France, 2009.
[5] A. Sahai and B. Waters, “Fuzzy identity based
encryption,” in Proc. Acvances in Cryptology—
Eurocrypt, 2005, vol. 3494, LNCS, pp. 457–473.
[6] Yanli Ren and Dawu Gu,“Efficient Hierarchical
Identity Based Encryption Scheme in the Standard
Model”in Proc. Informatica 32 (2008),pp 207–211.
[7] G.Wang, Q. Liu, and J.Wu, “Hierachical attributebased
encryption for fine-grained access control in
cloud storage services,” in Proc. ACM Conf. Computer
and Communications Security (ACM CCS), Chicago,
IL, 2010.
[8] Zhiguo Wan, Jun’e Liu, and Robert H. Deng, Senior
Member, IEEE, “HASBE: A Hierarchical Attribute-
Based Solution for Flexible and Scalable Access
Control in Cloud Computing”in Proc.IEEE
Transactions on Information Forensics and Security,
vol.7, No.2, April 2012.
[9] S.G.Shini and K.Chitharanjan, “Secure Cloud based
Medical Data exchange using Attribute based
Encryption,” Special Issue of International Journal of
Computer Applications on Advanced Computing and
Communication Technologies for HPC Applications –
ACCTHPCA, 2012.
[10] Hsiao-Ying Lin and Wen-Guey Tzeng, “A Secure
Erasure Code-Based Cloud Storage System with
Secure Data Forwarding,” IEEE Transactions on
parallel and distributed systems, Volume 23, No.6,
2012.
[11] B.Raja Sekhar, Sunil Kumar, L.Swathi Reddy and
V.PoornaChandar, “CP-ABE Based Encryption for
Secured Cloud Storage Acces,” International Journal of
Scientific & Engineering Research, Volume 3, Issue 9,
2012.
[12] K.Priyadarsini and C.Thirumalai selvan, “A Survey on
Encryption Schemes for Data Sharing in Cloud
Computing,” International Journal of Computer
Science and Information Technology & Security
(IJCSITS), Volume 2, No.5, 2012.