Privacy Preserving Using Multi Layer Encryption forDelegated Access Control in Public Clouds

K.Nethaji Sundar Sukumar*, L. Venkateswara Reddy**
* PG Scholar, Department of Information Technology, Sree Vidyanikethan Engineering College, Tirupati, Andhra Pradesh, India.
** Professor, Department of Information Technology, Sree Vidyanikethan Engineering College, Tirupati, Andhra Pradesh, India.
Periodicity:May - July'2014
DOI : https://doi.org/10.26634/jcc.1.3.3157

Abstract

The two layer encryption is to enforce the fine-grained access control on confidential data hosted in the cloud, based on fine-grained encryption data. Under this scenario, data owners are encrypting the data before uploading them on the cloud and re-encrypting the data whenever users change to an alternate. Here the owner is communicating with clouds and users. The better approach used is to minimize the overhead work at the data owners. So, the authors have proposed an approach by using multi layer encryption, whereas the cloud performs a fine-grained encryption. A challenging issue is how to decompose Access Control Policies (ACPs) such that the multi layer encryption can be performed. In the present context, the authors have used novel optimization algorithm and KeyGen algorithm. Also, an efficient group key management scheme, that supports ACPs to work efficiently, is also used.

Keywords

Privacy Preserving, Policy Decomposition, Fine-grained Encryption, Access Control Policy.

How to Cite this Article?

Sukumar, K. N. S. S., and Reddy, L. V. (2014). Privacy Preserving Using Multi Layer Encryption for Delegated Access Control in Public Clouds. i-manager’s Journal on Cloud Computing,1(3), 16-20. https://doi.org/10.26634/jcc.1.3.3157

References

[1]. Mohamed Nabeel and Elisa Bertino, (2014). “Privacy Preserving Delegated Access Control in Public Clouds", IEEE Transactions on Knowledge and Data Engineering, Vol. 26, No. 9, pp. 2268-2280.
[2]. M. Nabeel and E. Bertino, (2012). “Privacy Preserving Delegated Access Control in the Storage as a Service Model,” Proc. IEEE Int'l Conf. Information Reuse and Integration (IRI), pp. 645-652.
[3]. M. Nabeel, N. Shang, and E. Bertino, (2013). “Privacy Preserving Policy Based Content Sharing in Public Clouds,” IEEE Trans. Knowledge and Data Eng, Vol. 25, No. 11, pp. 2602-2614.
[4]. M. Nabeel and E. Bertino, (2011). “Towards Attribute Based Group Key Management,” Proc. 18th ACM Conf. Computer and Comm. Security, pp.821-824.
[5]. M. Nabeel and E. Bertino, (2010). “Attribute Based Group Key Management,” Centre for Education and Research, pp. 1-38.
[6]. S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, (2007). “Over-Encryption: Management of Access Control Evolution on Outsourced Data,” Proc. 33rd Int'l Conf. Very Large Data Bases (VLDB '07), pp. 123-134.
[7]. A. Fiat and M. Naor, (1994). “Broadcast Encryption,” Proc. 13th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '93), pp. 480-491.
[8]. A. Shamir, (1979). “How to Share a Secret,” Comm. of the ACM, Vol. 22, pp. 612-613.
[9]. M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, (2006). “Secure Attribute-Based Systems,” Proc. 13th ACM Conf. Computer and Comm. Security (CCS '06), pp. 99- 112.
[10]. V. Goyal, O. Pandey, A. Sahai, and B. Waters, (2006). “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. 13th ACM Conf. Computer and Comm. Security (CCS '06), pp. 89-98.
[11]. X. Liang, Z. Cao, H. Lin, and J. Shao, (2009). “Attribute Based Proxy Re-Encryption with Delegating Capabilities,” Proc. Fourth Int'l Symp.Information, Computer, and Comm. Security (ASIACCS '09), pp. 276-286.
[12]. J.-M. Do, Y.-J. Song, and N. Park, (2011). “Attribute Based Proxy Re-Encryption for Data Confidentiality in Cloud Computing Environments,” Proc. First Int'l Conf. Computers, Networks, Systems and Industrial Eng., pp. 248-251.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.