ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Special Issue Article Open Access

An Efficient and Secured Storage Delegated Access Control to Maintain Confidentiality of Data

Abstract

Security and privacy represent major concerns in the adoption of cloud technologies for data storage. An approach to mitigate these concerns is the use of fine grained access control encryption. But in this approach Data owners thus incur high communication and computation costs. To overcome this problem data owner performs a coarse-grained broad cast encryption along with two layer process, whereas the cloud performs a fine-grained encryption on top of the owner encrypted data. A challenging issue is how to decompose access control policies (ACPs) such that the two layer encryption can be performed. A better approach should delegate the enforcement of fine-grained access control to the cloud, so to minimize the overhead at the data owners, while assuring data confidentiality from the cloud. Our proposed go a step further in the dispense process in two layer broadcast encryption schema, by removing the group manager initial setup of the group, as well as the addition of further members to the system, does not require any central authority. Under our approach, the data owner performs a coarse-grained encryption, whereas the cloud performs a fine-grained encryption on top of the owner encrypted data. Our considered is an extension to the subset-cover framework. It allows for efficient concrete instantiations, with parameter sizes that match those of the subset-cover constructions, while at the same time achieving the highest security level in the standard model. We utilize coherent group key management scheme that supports expressive ACPs. Our system assures the confidentiality of the data and preserves the privacy of users from the cloud while delegating most of the access control enforcement to the cloud.

Syed Yasmeen, M. Naveen Kumar

To read the full article Download Full Article