Open Access Open Access  Restricted Access Subscription Access

A Novel Approach for Data Privacy Using Attribute Based Scheme Algorithm for Cloud Computing


Affiliations
1 S.T. Hindu College, Nagercoil, Tamilnadu, India
2 Department of Computer Science and Research Centre, S.T. Hindu College, Nagercoil, Tamilnadu, India
3 Department of Software Engineering, Firat University, 23119, Elazig, Turkey
 

Cloud computing is the mass storage area that helps the user to access the data anywhere. There are so many platforms provided by the cloud service provider. They are SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service) etc. Though security is not fully provided by the cloud service provider to reshape the advances in information technology, cloud computing is expected as an updated technology. The data was securely stored in the cloud and if it is corrupted then the proxy is implemented to regenerate the corrupted data in the cloud. Thus security and integrity is successfully achieved. This is further extended by implementing efficient file fetching by the third party user. To maintain efficient file fetching system Multi authority cloud model is proposed. The model is continuing with the proposed entities such as Attribute authority (AA), Certificate Authority (CA) and Third party end user. The data is encrypted by the owner and stored in the cloud server. CA is used to delegate the Secret Key (SK) to AA and Public Kay (PK) to user. After Checking the authentication of the owner CA provides PK to the owner only then the owner is allowed to upload the data in cloud, the data is encrypted and outsource to the cloud server. Using SK the third party user is allowed to view the data from the cloud. If the user enter the wrong key or misuse the data, user will be revoked. If the User needs to download or update or delete the data in the cloud the user need to send a Data Access Privilege (DAP) request to the respective owner. Certificate authority is responsible to generate a key to the entities such as User, Data Owner and attributes.

Keywords

Cloud Computing, Security, Third Party Auditor (TPA), Proxy, RSA Algorithm, Regeneration, Multiuser Authentication.
User
Notifications
Font Size

Abstract Views: 385

PDF Views: 0




  • A Novel Approach for Data Privacy Using Attribute Based Scheme Algorithm for Cloud Computing

Abstract Views: 385  |  PDF Views: 0

Authors

A. Nithya
S.T. Hindu College, Nagercoil, Tamilnadu, India
B. Ramakrishnan
Department of Computer Science and Research Centre, S.T. Hindu College, Nagercoil, Tamilnadu, India
Resul Das
Department of Software Engineering, Firat University, 23119, Elazig, Turkey

Abstract


Cloud computing is the mass storage area that helps the user to access the data anywhere. There are so many platforms provided by the cloud service provider. They are SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service) etc. Though security is not fully provided by the cloud service provider to reshape the advances in information technology, cloud computing is expected as an updated technology. The data was securely stored in the cloud and if it is corrupted then the proxy is implemented to regenerate the corrupted data in the cloud. Thus security and integrity is successfully achieved. This is further extended by implementing efficient file fetching by the third party user. To maintain efficient file fetching system Multi authority cloud model is proposed. The model is continuing with the proposed entities such as Attribute authority (AA), Certificate Authority (CA) and Third party end user. The data is encrypted by the owner and stored in the cloud server. CA is used to delegate the Secret Key (SK) to AA and Public Kay (PK) to user. After Checking the authentication of the owner CA provides PK to the owner only then the owner is allowed to upload the data in cloud, the data is encrypted and outsource to the cloud server. Using SK the third party user is allowed to view the data from the cloud. If the user enter the wrong key or misuse the data, user will be revoked. If the User needs to download or update or delete the data in the cloud the user need to send a Data Access Privilege (DAP) request to the respective owner. Certificate authority is responsible to generate a key to the entities such as User, Data Owner and attributes.

Keywords


Cloud Computing, Security, Third Party Auditor (TPA), Proxy, RSA Algorithm, Regeneration, Multiuser Authentication.