Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Decentralized KDC Scheme with Verifiable Outsourcing of Key Updates in Cloud Computing


Affiliations
1 Department of Computer Applications, Alagappa University, Karaikudi, Tamil Nadu, India
2 Department of Computer Science, Alagappa University, Karaikudi, Tamil Nadu, India
     

   Subscribe/Renew Journal


Security and protection are exceptionally main issues in distributed computing. In existing cloud condition get to control system are provincial in nature. The scheme utilizes a symmetric key approach and does not bolster verification. Symmetric key calculation utilizes same key for both encryption and decoding. Adopt a coordinated strategy where a solitary key Distribution center (KDC) appropriates mystery keys and credits to all clients. The specialist of the client who stores the information is additionally confirmed. Distributed computing’s multi-tenure element, which gives protection, security and get to control challenges, in view of sharing of physical assets among untrusted inhabitants. Keeping in mind the end goal to accomplish safe stockpiling, arrangement based document get to control, strategy based record guaranteed cancellation and approach based reclamation of a record put away in a cloud situation, an appropriate encryption methodology with key administration ought to be connected before outsourcing the information. Actualized secure distributed storage by giving access to the documents with the approach based record get to utilizing Attribute Based Encryption (ABE) conspire with RSA key open private key stage. Private Key is the mix of the client’s accreditations. So that high security will be accomplished. Time based record Repudiation plan is utilized for document guaranteed cancellation. At the point when the time furthest reaches of the record lapsed, the document will be suddenly denied and can’t be reasonable to anybody in future. Approach based record recharging is proposed. The Rebuilding should be possible by giving the new key to the current document, will remains the record until the new time constrain comes to. Regardless, in finishing accordingly, these outcomes clearly introduce a generous preparing overhead on the information owner for key dissipating and information organization when fine-grained information get to control is popular, and in this way don’t scale well. In the proposed design, the cloud embraces a get to control approach and credits concealing procedure to improve security. This new example underpins secure and proficient dynamic operation on information squares, including: information 5623 refresh, creation, modification and perusing information put away in the cloud. Besides, our confirmation and get to control example is decentralized and vigorous, not at all like different get to control plans intended for mists which are united. We additionally give choices to record recuperation.

Keywords

Attribute Based Encryption, Cloud Computing, Cloud Storage, Key Distribution Center.
Subscription Login to verify subscription
User
Notifications
Font Size


  • S. S. Ruj, M. Stojmenovic, and Amiya Nayak, “Decentralized access control with anonymous authentication of data stored in clouds,” IEEE transactions on parallel and distributed systems.
  • Y. Tang, P. P. C. Lee, J. C. S. Lui, and R. Perlman, “Secure overlay cloud storage with access control and assured deletion,” IEEE Transcations on dependable and secure computing.
  • G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,” In ACM CCS, pp. 735-737, 2010.
  • Y. Tang, P.P.C. Lee, J.C.S. Lui, and R. Perlman, “FADE: Secure Overlay Cloud Storage with File Assured Deletion,” Proc. Sixth Int’l ICST Conf.Security and Privacy in Comm. Networks (SecureComm), 2010.
  • R. Perlman, “File System Design with Assured Delete,” Proc. Network and Distributed System Security Symp. ISOC (NDSS), 2007.
  • Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed access control in clouds,” in IEEE TrustCom, 2011.
  • A. Rahumed, H.C.H. Chen, Y. Tang, P.P.C. Lee, and J.C.S. Lui, “A secure cloud backup system with assured deletion and version,”.
  • M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” Comm. of the ACM, vol. 53, no. 4, pp. 50-58, Apr 2010.
  • S. Ruj, M. Stojmenovic, and A. Nayak, “Decentralized access control with anonymous authentication of data stored in clouds,” IEEE Transactions On Parallel And Distributed Systems.
  • W. Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” IEEE T.Services Computing, vol. 5, no.2, pp. 220-232, 2012.

Abstract Views: 299

PDF Views: 8




  • Decentralized KDC Scheme with Verifiable Outsourcing of Key Updates in Cloud Computing

Abstract Views: 299  |  PDF Views: 8

Authors

A. Mareeswari
Department of Computer Applications, Alagappa University, Karaikudi, Tamil Nadu, India
S. Santhosh Kumar
Department of Computer Science, Alagappa University, Karaikudi, Tamil Nadu, India

Abstract


Security and protection are exceptionally main issues in distributed computing. In existing cloud condition get to control system are provincial in nature. The scheme utilizes a symmetric key approach and does not bolster verification. Symmetric key calculation utilizes same key for both encryption and decoding. Adopt a coordinated strategy where a solitary key Distribution center (KDC) appropriates mystery keys and credits to all clients. The specialist of the client who stores the information is additionally confirmed. Distributed computing’s multi-tenure element, which gives protection, security and get to control challenges, in view of sharing of physical assets among untrusted inhabitants. Keeping in mind the end goal to accomplish safe stockpiling, arrangement based document get to control, strategy based record guaranteed cancellation and approach based reclamation of a record put away in a cloud situation, an appropriate encryption methodology with key administration ought to be connected before outsourcing the information. Actualized secure distributed storage by giving access to the documents with the approach based record get to utilizing Attribute Based Encryption (ABE) conspire with RSA key open private key stage. Private Key is the mix of the client’s accreditations. So that high security will be accomplished. Time based record Repudiation plan is utilized for document guaranteed cancellation. At the point when the time furthest reaches of the record lapsed, the document will be suddenly denied and can’t be reasonable to anybody in future. Approach based record recharging is proposed. The Rebuilding should be possible by giving the new key to the current document, will remains the record until the new time constrain comes to. Regardless, in finishing accordingly, these outcomes clearly introduce a generous preparing overhead on the information owner for key dissipating and information organization when fine-grained information get to control is popular, and in this way don’t scale well. In the proposed design, the cloud embraces a get to control approach and credits concealing procedure to improve security. This new example underpins secure and proficient dynamic operation on information squares, including: information 5623 refresh, creation, modification and perusing information put away in the cloud. Besides, our confirmation and get to control example is decentralized and vigorous, not at all like different get to control plans intended for mists which are united. We additionally give choices to record recuperation.

Keywords


Attribute Based Encryption, Cloud Computing, Cloud Storage, Key Distribution Center.

References