0% found this document useful (0 votes)
101 views4 pages

Review Paper On An Efficient Encryption Scheme in Cloud Computing Using ABE

Security for the data which is stored on the cloud by user is very important issue. User may expect some security for their data from the cloud service provider, there can be serious issues concerning data security between user and service provider. To solve this kind of issues, we can use third party as an auditor. Here we have analyzed different ways to ensure secure data storage in cloud. We are going to provide the security to the user's data by using encryption technique. For this we are using the Advanced Encryption Standard algorithm for encryption and decryption. But when Cloud Service Provider has both encryption and decryption keys, there is threat to security and privacy of data. CSP may pass the user data without user's knowledge. For auditing we are introducing Third Party Auditor. Here the data will be encrypted at user side and will be in encrypted form over network and to TPA. TPA will verify the data before storing it on the cloud. There are large numbers of users of cloud computing who are accessing and modifying the data and they need the reliable service provider who can provide complete security for their data. So the TPA will audit the data and check the data integrity of client's data. Hence user will have more elaborated view over his data privacy. Rutuja G. Kaple | Prof. S. B. Rathod"Review Paper On An Efficient Encryption Scheme In Cloud Computing Using ABE" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10915.pdf http://www.ijtsrd.com/computer-science/computer-network/10915/review-paper-on-an-efficient-encryption-scheme-in-cloud-computing-using-abe/rutuja-g-kaple

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views4 pages

Review Paper On An Efficient Encryption Scheme in Cloud Computing Using ABE

Security for the data which is stored on the cloud by user is very important issue. User may expect some security for their data from the cloud service provider, there can be serious issues concerning data security between user and service provider. To solve this kind of issues, we can use third party as an auditor. Here we have analyzed different ways to ensure secure data storage in cloud. We are going to provide the security to the user's data by using encryption technique. For this we are using the Advanced Encryption Standard algorithm for encryption and decryption. But when Cloud Service Provider has both encryption and decryption keys, there is threat to security and privacy of data. CSP may pass the user data without user's knowledge. For auditing we are introducing Third Party Auditor. Here the data will be encrypted at user side and will be in encrypted form over network and to TPA. TPA will verify the data before storing it on the cloud. There are large numbers of users of cloud computing who are accessing and modifying the data and they need the reliable service provider who can provide complete security for their data. So the TPA will audit the data and check the data integrity of client's data. Hence user will have more elaborated view over his data privacy. Rutuja G. Kaple | Prof. S. B. Rathod"Review Paper On An Efficient Encryption Scheme In Cloud Computing Using ABE" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10915.pdf http://www.ijtsrd.com/computer-science/computer-network/10915/review-paper-on-an-efficient-encryption-scheme-in-cloud-computing-using-abe/rutuja-g-kaple

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

International Journal of Trend in Scientific

Research and Development (IJTSRD)


International Open Access Journal
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume - 2 | Issue – 3

Review Paper On An Efficient Encryption Scheme In Cloud


Computing Using ABE
Rutuja G. Kaple Prof. S. B. Rathod
Department of Computer Science and Engineering, Department of Computer Science and Engineering,
Sipna College of Engineering and Technology,
echnology, Sipna
pna College of Engineering and Technology,
T
Amravati, India Amravati, India

ABSTRACT

Security for the data which is stored on the cloud by now, the cloud computing is one of the most able
user is very important issue. User may expect some applications platforms to solve the unstable expanding
security for their data from the cloud service provider, of data sharing along network. Computing technology
there can be serious issues concerning data security increase by cloud computing that uses Internet. It
between user and service provider. To solsolve this kind consists of the use of computing assets. That are ar
of issues, we can use third party as an auditor. Here delivered as a service to give access to their data for
we have analyzed different ways to ensure secure data storing and performing the preferred business
storage in cloud. We are going to provide the security operations, hence cloud service provider must provide
to the user’s data by using encryption technique. For the trust and security. There is valuable and most
this we are using the Advanced
nced Encryption Standard sensitive data in vast amount stored on the clouds.
clo
algorithm for encryption and decryption. But when There are concerns about scalable, flexible and the
Cloud Service Provider has both encryption and fine grained access control in the cloud computing
decryption keys, there is threat to security and privacy technology. For this intention there have been many
of data. CSP may pass the user data without user’s of the related
lated schemes that are proposed for purpose
knowledge. For auditing we are introducing Third of encryption. Such as simple encryption technique
tec
Party Auditor. Here the data will be encrypted at user that is typically studied. Hence we are going to
side and will be in encrypted form over network and discuss about Attribute Based Encryption schemes
to TPA. TPA will verify the data before storing it on and how this scheme has been developed and also
the cloud. There are large numbers of users of cloud modified further into key policy. The cloud
computing who are accessing and modifying the data computing technique has rapidly become a very
and they need the reliable service provider who can widely adopteded standard for delivering services over
provide complete security for their data. So the TPA the internet. Therefore, cloud services provider must
will audit the data and check the data integrity of provide the trust and security, as there is sensitive and
client’s data. Hence user will have more elaborated important data in large amount stored on clouds. For
view over his data privacy. protecting the privacy of the stored data, the data
dat must
be encrypted before uploading to the cloud by using
Keywords: Cloud Computing, Attribute based some cryptographic algorithms. In this paper we
encryption, Key policy, ciphertext policy, going to discuss about attribute based encryption
hierarchical-ABE scheme and its categories. Cipher text policy attribute
based encryption is one of possible schemes which
1. Introduction
has much more appropriate and more flexible for
In the network technology online data allotment has general application authority accepts the user
become a new pet, such as MySpace, Facebook .For enrolment and creates some parameters. By the User

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr


Apr 2018 Page: 415
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
downloads and decrypts the interested cipher text ABE schemes. Cheung and Newport first used AND
from the cloud server provider. The shared files are gate access structure to achieve CP-ABE scheme.
usually have hierarchical structure. That’s a group of Later, some improved schemes are proposed.
files are divided into a many number of hierarchy Meanwhile, there are CP-ABE schemes based on
subgroups located at different access levels. If the access tree that support AND, OR, and threshold, and
files in the same hierarchical structure could be based on LSSS where and are the typical schemes of
encrypted by an integrated access structure, the access tree and LSSS. Other CP-ABE schemes with
storage cost of ciphertext time and cost of encryption specific features have been presented. For example,
could be saved. So, an access structure could be Hur proposed a data sharing scheme to solve the
shared by the two files. Moreover, transport nodes problem of key escrow by using an escrow free key
are added in the given access structure, so users can issuing protocol between the key generation center
decrypt all authorization files with computation of and the data storing center. Green et al. and Lai et al
secret key once. The computation cost of decryption .proposed CP-ABE schemes with outsourced
can also be reduced if users need to decrypt numerous decryption to reduce the workload of the decryption
files at the same time. user. And Fan et al .proposed an arbitrary-state ABE
scheme to solve the problem of the dynamic
2. Literature Review membership management. In addition, Guoet al. [15]
proposed a novel constant-size decryption key CP-
Atenieseet al.are the first to consider public
ABE scheme for storage-constrained devices. Shah et
auditability in their defined “provable data
al. propose allowing a TPA to keep online storage
possession” model for ensuring possession of data
honest by first encrypting the data then sending a
files on untrusted storages. Their scheme utilizes the
number of pre-computed symmetric-keyed hashes
RSA-based homomorphic authenticators for auditing
over the encrypted data to the auditor. The auditor
outsourced data and suggests randomly sampling a
verifies both the integrity of the data file and the
few blocks of the file. However, the public
server’s possession of apreviously committed
auditability in their scheme demands the linear
decryption key. This scheme only works for encrypted
combination of sampled blocks exposed to external
files, and it suffers from the auditor state fulness and
auditor. When used directly, their protocolis not
bounded usage, which may potentially bring in on-
provably privacy preserving, and thus may leak user
line burden to users when the keyed hashes are used
data information to the auditor. Juelset al.describe a
up. In other related work, Ateniese et al. propose a
“proof of retrievability” (PoR) model, where spot-
partially dynamic version of the prior PDP scheme,
checking and error correcting codes are used to ensure
using only symmetric key cryptography but with a
both “possession” and “retrievability” of data files on
bounded number of audits.
remote archive service systems. However, the number
of audit challenges a user can perform is a fixed 3. Design Goal
priori, and public auditability is not supported in their
main scheme. Sahai and Waters proposed fuzzy For find out ranked search for effective operation of
Identity-Based Encryption (IBE) in 2005, which was
outsourced cloud data under the mentioned model, our
the prototype of ABE.[3] Latterly, a variant of ABE
named CP-ABE was proposed. Wan et al. proposed system design should simultaneously realize security
hierarchical ABE scheme. Later, Zou gave a
and performance guarantees as follows.
hierarchical ABE scheme, while the length of secret
key is linear with the order of the attribute set. A
ciphertext policy hierarchical ABE scheme with short 1. Efficiency : This also perform privacy should be
ciphertext is also studied in . In these schemes, the achieved with low communication and computation
parent authorization domain governs its child
authorization domains and a top-level authorization overhead.
domain creates secret key of the next-level domain.
The work of key creation is distributed on multiple 2. Multi – keyword Ranked Search : To implements
authorization domains and the burden of key authority search schemes which access multi – keyword query
centeris lightened. At present, there are three types of and provide result comparison ranking for effective
access structures AND gate, access tree, and linear data retrieval.
secret sharing scheme (LSSS) used in existing CP-

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 416
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
REFERENCES
1) Cong Wang, Member, IEEE, Sherman S.M.
Chow, Qian Wang, Member, IEEE, KuiRen,
Senior Member, IEEE, and Wenjing Lou,Senior
Member, IEEE, ”Privacy- Preserving Public
Auditing for Secure Cloud Storage” IEEE
Transactions on Computers, vol. 62,no. 2,
February 2013.R. Caves, Multinational Enterprise
and Economic Analysis, Cambridge University
Fig.1: An example of secure data sharing in cloud Press, Cambridge, 1982.
computing.
2) CloudSecurityAlliance,“TopThreatstoCloudComp
4. Proposed Work uting,”http://www.cloudsecurityalliance.org, 2010
Now days there is increase in documents day by day 3) G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
and performing encryption and decryption will take Kissner, Z.Peterson, and D. Song, ”Provable Data
time to execute so to eliminate the this we are Possession at UntrustedStores,” Proc.14th ACM
proposing an third server based attribute based Conf. Computer and Comm. Security (CCS ’07),
encryption scheme in cloud computing in which we pp. 598-609, 2007.
are going to handle the secure sharing . In cloud 4) A. Juels and J. Burton, S. Kaliski, ”PORs: Proofs
storage due to highly encryption and decryption of Retrievability for Large Files,” Proc. ACM
technique it is become very typical which will bear Conf. Computer and Comm.Security (CCS’07),
the responsibility of encryption and decryption so that pp. 584-597, Oct. 2007.008.
the load on main server will gets down and helps to
retrieve the data effectively. In proposed the auditing 5) M.A. Shah, R. Swaminathan, and M. Baker,
get applied with various file structures like integrity ”Privacy- Preserving Audit and Extraction of
which will help the file encryption time more Digital Contents,” Cryptology ePrintArchive,
effective and security is get improved. Report 2008.
6) H. Shacham and B. Waters, ”Compact Proofs of
5. Conclusion Retrievability,” Proc. Int’l Conf. Theory and
A system for efficient encryption scheme is Application of Cryptology andInformation
implemented. In implemented system data storage Security: Advances), in Cryptology (Asiacrypt
security in Cloud Computing is an emerging vol. 5350, pp. 90-107, Dec. 2008.
computing paradigm, allows users to share 7) A. Juels and B. S. KaliskiJr, “PORs: Proofs of
information. Cloud storage is much more beneficial Retrievability for Large Files,” in Proceedings of
and advantageous than the earlier traditional storage the 14th ACM Conference of Computer and
systems especially in scalability, cost reduction, Communications Security, pp. 584–597, 2007.
portability and functionality requirements. Cloud
8) A. Sahai and B. Waters, “Fuzzy identity-based
Computing is an area full of challenges and of
encryption,” in Advancesin Cryptology. Berlin,
paramount importance and many research problems
Germany: Springer, May 2005, pp. 457–473.
are yet to be identified. System uses
encryption/decryption keys. of uses data and stores it 9) V. Goyal, O. Pandey, A. Sahai, and B. Waters,
on cloud server. Each storage server has an encrypted “Attribute-based encryptionfor fine-grained access
file system which encrypts the clients data and store. control of encrypted data,” in Proc. 13thACM
The system ensures that the user data is stored only on Conf. Comput. Commun.Secur., Oct. 2006, pp.
trusted storage servers and it cannot be accessed by 89–98.
intruders. In particular, we consider the task of 10) W. Zhu, J. Yu, T. Wang, P. Zhang, and W. Xie,
allowing a third party auditor (TPA), on behalf of the “Efficient attribute-basedencryption from R-
cloud client, to verify the integrity of the dynamic LWE,” Chin. J. Electron., vol. 23, no. 4, pp. 778–
data stored in the cloud. 782,Oct. 2014.

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 417
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
11) J. Bethencourt, A. Sahai, and B. Waters,
“Ciphertext-policy attribute based encryption,” in
Proc. IEEE Symp.Secur. Privacy, May 2007,pp.
321–334.
12) L. Cheung and C. Newport, “Provably secure
ciphertext policy ABE,”in Proc. 14th ACM Conf.
Comput. Commun .Secur., Oct. 2007,pp. 456–465.
13) L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and
W. Jonker, “Mediatedciphertext-policy attribute-
based encryption and its application,” in Proc.10th
Int. Workshop Inf. Secur. Appl., Aug. 2009, pp.
309–323.
14) X. Xie, H. Ma, J. Li, and X. Chen, “An efficient
ciphertext-policyattribute-based access control
towards revocation in cloud computing,”J.
Universal Comput. Sci., vol. 19, no. 16, pp. 2349–
2367, Oct. 2013.
15) F. Guo, Y. Mu, W. Susilo, D. S. Wong, and V.
Varadharajan,“CP-ABE with constant-size keys
for lightweight devices,” IEEE Trans.Inf.
Forensics Security, vol. 9, no. 5, pp. 763–771,
May 2014.1276 IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND
SECURITY, VOL. 11, NO. 6, JUNE 2016

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 418

You might also like