Information Fortification, Confidentiality, Accessibility and Reliability in Cloud Computing: Issues and Present Solution

R. Priyadharsini *, M. Ramya **
*-** Department of Computer Science and Engineering, Muthayammal Engineering College, Rasipuram, Namakkal, Tamilnadu, India.
Periodicity:January - June'2021
DOI : https://doi.org/10.26634/jcc.8.1.18457

Abstract

The fact that customers of remote cloud storage services do not have complete physical control of their data makes privacy data search a difficult task. Delegating access to the stored data and completing a search operation to a trusted party is a basic method. However, this does not scale well in practice, as full data access might easily compromise user privacy. We need to ensure the privacy of search contents, i.e., what a user wishes to search and what the server sends back to the user, to securely implement an effective solution. Furthermore, we must ensure that the outsourced data is kept private and that the user is not burdened with an additional local search burden. We present an efficient file modified Key Policy Attribute-Based Encryption technique (KP-ABE) in this paper. A modified Key-policy attribute-based encryption Encryption method is used by data owners to encrypt their confidential data for data recipients. The files could share the ciphertext components linked to characteristics. As a result, both ciphertext storage and encryption time are reduced.

Keywords

Key-Policy Attribute-Based Encryption (KP-ABE), Ciphertext, Privacy, Encryption, Decryption.

How to Cite this Article?

Priyadharsini, R., and Ramya, M. (2021). Information Fortification, Confidentiality, Accessibility and Reliability in Cloud Computing: Issues and Present Solution. i-manager's Journal on Cloud Computing, 8(1), 16-22. https://doi.org/10.26634/jcc.8.1.18457

References

[1]. Babitha, M. P., & Babu, K. R. (2016, September). Secure cloud storage using AES encryption. In 2016, International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), (pp. 859-864). IEEE. https://doi.org/10.1109/ICACDOT.2016.7877709
[2]. Chachapara, K., & Bhadlawala, S. (2013, November). Secure sharing with cryptography in cloud computing. In 2013, Nirma University International Conference on Engineering (NUiCONE), (pp. 1-3). IEEE. https://doi.org/10. 1109/NUiCONE.2013.6780085
[3]. Chu, C. K., Chow, S. S., Tzeng, W. G., Zhou, J., & Deng, R. H. (2013). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25(2), 468-477. https://doi.org/10. 1109/TPDS.2013.112
[4]. Liu, J. K., Au, M. H., Huang, X., Lu, R., & Li, J. (2015). Finegrained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security, 11(3), 484-497. https://doi.org/ 10.1109/TIFS.2015.2493983
[5]. Perez, J. M. M., Perez, G. M., & Gómez, A. F. S. (2016). SecRBAC: Secure data in the Clouds. IEEE Transactions on Services Computing, 10(5), 726-740. https://doi.org/10. 1109/TSC.2016.2553668
[6]. Prajapati, P., & Shah, P. (2020). A review on secure data deduplication: Cloud storage security issue. Journal of King Saud University-Computer and Information Sciences. (In Press). https://doi.org/10.1016/j.jksuci.2020.10.021
[7]. Puri, N. A., Karare, A. R., & Dharmik, R. C. (2014, May). Deployment of application on cloud and enhanced data security in cloud computing using ECC algorithm. In 2014, IEEE International Conference on Advanced Communications, Control and Computing Technologies, (pp. 1667-1671). IEEE. https://doi.org/10.1109/ICACCCT. 2014.7019392
[8]. Rao, Y. S. (2017). A secure and efficient ciphertextpolicy attribute-based signcryption for personal health records sharing in cloud computing. Future Generation Computer Systems, 67, 133-151. https://doi.org/10.1016/ j.future.2016.07.019
[9]. Tseng, Y. M., Tsai, T. T., Huang, S. S., & Huang, C. P. (2016). Identity-based encryption with cloud revocation authority and its applications. IEEE Transactions on Cloud Computing, 6(4), 1041-1053. https://doi.org/10.1109/TCC. 2016.2541138
[10]. Ubaidur Rahman, N. H., Balamurugan, C., & Mariappan, R. (2015). A novel DNA computing based encryption and decryption algorithm. Procedia Computer Science, 46, 463-475. https://doi.org/10.1016/j.procs. 2015.02.045
[11]. Xhafa, F., Wang, J., Chen, X., Liu, J. K., Li, J., & Krause, P. (2014). An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Computing, 18(9), 1795-1802. https://doi.org/10.1007/ s00500-013-1202-8
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.