Secure Sharing of Data over Cloud Computing using Different Encryption Schemes An Overview  
  Authors : Raseena M; Harikrishnan G R;

 

Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises. With the high costs of storage devices as well as the huge amount of data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Data outsourcing to the cloud helps in reduction in storage costs and reducing the maintenance. Cloud storage stores the users data to large data centers, which are remotely located. User does not have any control on those centers .This feature of the cloud poses many security issues and need to understand and solve this problem. Data security is the most important challenges in cloud computing. To assure the clients control over access to their own data’s, it is a promising method to encrypt the data’s before outsourcing. So many issues are remained for achieving fine grained data access control. Such as scalability in key management, flexible access, efficient user revocation and privacy problems. So many encryption techniques are used for achieving these features. To achieve fine-grained and scalable data access control for client’s data, different attribute-based encryption (ABE) techniques are used.

 

Published In : IJCAT Journal Volume 1, Issue 2

Date of Publication : 31 March 2014

Pages : 08 - 11

Figures : --

Tables : --

Publication Link : IJCAT-2014/1-2/Secure-Sharing-of-Data-over-Cloud-Computing-using-Different-Encryption-Schemes-An-Overview

 

 

 

Raseena M : received the Bachelor’s degree in Computer science and Engineering from the Mahatma Gandhi University, Kerala in 2008. Presently she is pursuing her M.Tech in the department of Computer Science and Engineering from Calicut University, Kerala. She has industry experience of three and half years. Her research interests include data security in cloud computing, cryptography and mobile cloud computing etc.

Harikrishnan G R : is an Assistant Professor in Department of Computer Science and Engineering at MES College of Engineering,Kuttipuram.He received Bachelor’s degree in Information Technology from Kerala University and ME in Computer Science and Engineering from Anna University, Chennai. He has a teaching experience of two and half years. His research area includes cloud computing, mobile cloud computing and cloud security.

 

 

 

 

 

 

 

Cloud computing

Data privacy

Fine grained access control

Attribute based encryption

Data security is the major problem in cloud storage. For securing outsourced data different encryption schemes are used. If the data’s are moved to the cloud advanced encryption schemes are needed. So overviewed different attributes based encryption (ABE) schemes that can be used in cloud systems for flexible, scalable and fine grained access control. In ABE scheme, there are both the secret key and cipher text are associated with a set of attributes. Different variation of the ABE is used for better access control and security. Out of these schemes, find out that the MA-ABE scheme provides more scalable, flexible and fine-grained access control than any other schemes in cloud computing.

 

 

 

 

 

 

 

 

 

[1] J. Hur and D.K. Noh, ”Attribute-Based Access Control with Efficient Revocation in Data Out- sourcing Systems”, IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214-1221, 2011.

[2] X. Liang, R. Lu, X. Lin, and X.S. Shen, ”Cipher- text Policy Attribute Based Encryption with Ef- ficient Revocation”, technical report, Univ. of Waterloo, 2010.

[3] M. Chase and S.S. Chow, ” Improving Pri- vacy and Security in Multi-Authority Attribute- Based Encryption”, Proc. 16th ACM Conf. Computer and Comm. Security (CCS 09), pp 121-130 ,2009.

[4] J. Bethencourt, A. Sahai, and B. Waters,” Ciphertext-Policy Attribute-Based Encryption ” Proc. IEEE Symp. Security and Privacy (SP), pp. 321-334 ,2007.

[5] S. Yu, C. Wang, K. Ren, and W. Lou, ”At- tribute Based Data Sharing with Attribute Re- vocation”, Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS 10) 2010.

[6] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, ”Ciphertext-Policy Attribute- Based Threshold Decryption with Flexible Del- egation and Revocation of User Attributes”, IEEE Trans.Image process,Jun, 2009.

[7] A. Boldyreva, V. Goyal, and V. Kumar,”Identity-Based Encryption with Efficient Revocation”, Proc. 15th ACM Conf. Computer and Comm. Security (CCS), pp. 417-426, 2008.

[8] V. Goyal, O. Pandey, A. Sahai, and B. Wa- ters, ”Attribute-Based Encryption for Fine- Grained Access Control of Encrypted Data”, Proc. 13th ACM Conf. Computer and Comm. Security (CCS 06), pp. 89-98, 2006.

[9] Ming Li, Shucheng Yu,Yao Zheng, Kui Ren, and Wenjing Lou, ”Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption”, Ieee transaction on parallel and distributed sys- tems,vol.24,no.1,january , 2013.

[10] G.Wang, Q. Liu, and J.Wu, ”Hierarchical attribute-based encryption for fine-grained access control in cloud storage services”, in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Chicago, IL , 2010.

[11] Melissa Chase, ”Multi-authority Attribute Based Encryption”, In TCC, volume 4392 of LNCS, pages 515534.

[12] Guojun Wang,, Qin Liu,, Jie Wub, Minyi Guo c “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers”.