M.R.Kavitha Rani, K.L.N. College of Engineering; S.Brindha ,K.L.N. College of Engineering

CP-ABE, Anonymity, Multi-Authority, Cloud Storage, Access Control, Attribute Revocation

Cloud computing is a recent technology provides a flexible, on-demand and low cost feature of computing resources. The Main issue in Cloud Computing is user identity privacy and data content privacy. The User Privacy in Cloud Computing is achieved by various data access control Schemes. Existing Fully Anonymous Access control scheme with decentralized attribute authority provides data content privacy and also prevents full user identity leakage by using N-oblivious transfer and multi-authority ciphertext-policy attribute based encryption scheme. But user attribute revocation is not implemented for better security. Supporting user revocation over Anonymous Multi-authority Ciphertext-policy attribute based encryption (MA-CP ABE) is an important issue in the real application. We Propose a Revocable Anonymous Access Control with Multi-authority cloud storage system to enhance the security and to solve revocation problem, Here Each Individual Attribute Authority is able to issue the attributes and keys independently. Our Revocable Anonymous Access Control Scheme for Multi-Authority Ciphertext-Policy Attribute Based Encryption can achieve both forward and backward security. Our security analysis and performance analysis shows that our scheme is more secure and more efficient than previous work.
    [1] Jun beom hur and dong kun Noh(2011),”Attribute-Based Access Control with Efficient Revocation in Data Outsourcing systems”, IEEE Transactions on parallel and Distribute systems, Vol:22 no.7 PP:1214-1221. [2] Kan Yang,Xiahoua jia,(2013),“Expressive, Efficient and Revocable Data Access Control for Multi-authority cloud storage”, IEEE Transaction on Parallel and Distributed Systems Vol:25,Issue:7,PP:1735-11744. [3] Liu Zhenpeng, Zhu Xianchao, Zhang Shouhua (2014), “Multi authority attribute based encryption with attribute revocation”,IEEE 17th International Conference on Computational Science and Engineering, DOI:10.1109/CSE.2014.343,PP:1872-1876. [4] S.Yu, C.Wang, K.Ren and W.Lou,”Attribute Based Data Sharing with Attribute Revocation” (2010), Proc.5th ACM Symp. Information, Computer and Comm. Security (ASIACCS’10), pp: 261-270. [5] Sushmita Ruj, Milos Stojmenovic, and Amiya Nayak (2014), “Decentralized Access Control with Anonymous authentication of Data Stored in Cloud”, IEEE Transactions on Parallel and Distributed Systems, 2014 VOL. 25, NO. 2, PP: 384-395. [6] S.J.Hur and D.K.Noh (2010), “Attribute – Based Access Control with Efficient Revocation in Data Outsourcing System”, IEEE Transactions on Parallel and Distributed System, DOI:10.1109/TPDS.2010.203 PP: 1045-1221. [7] S.Jahid, P.Mittal and N.Borisov (2013), “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute Based Encryption”, IEEE Transaction on Parallel and Distributed Systems Vol:24,Issue:1,PP:131-143. [8] Tacho Jung, Xiang-Yang Li, Zhiguo Wan and Meng Wan. (2015). “Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute Based encryption”. IEEE Transaction on Information Forensics and Security, vol: 10 no.1, pp: 190-198. [9] Xingxing xie,Hua ma,jin li xiaofeng chen(2015), ”Multi-Authority Attribute Based Encryption scheme with revocation”, (ICCCN) 24th Internal Conference on computer communication and Networks,DOI:10.1109/ICCCN.2015.7288431,PP:1-5. [10] Yong cheng,Zhi ying wang Jun ma,Jiang-Jiang Wu,Song-zhu Mei(2013), “Efficient Revocation in cipher text- policy attribute based encryption based cryptographic cloud storage”, Journal of Zhejiang University-Science (Computers & Electronics), vol:14,No:2 PP:85-97.
Paper ID: GRDCF002025
Published in: Conference : International Conference on Innovations in Engineering and Technology (ICIET - 2016)
Page(s): 103 - 109