Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage

Abstract

Cloud storage facilitates both individuals and enterprises to cost effectively share their data over the Internet.However, this also brings difficult challenges to the access control of shared data since few cloud servers can be fully trusted. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising approach that enables the data owners themselves to place fine-grained and cryptographically-enforced access control over outsourced data. In this paper, we present secure and cost-effective attribute-based data access control for cloud storage systems. Specifically, we construct a multiauthority CP-ABE scheme that features: 1) the system does not need a fully trusted central authority, and all attribute authorities independently issue secret keys for users; 2) each attribute authority can dynamically remove any user from its domain such that those revoked users cannot access subsequently outsourced data; 3) cloud servers can update the encrypted data from the current time period to the next one such that the revoked users cannot access those previously available data; and 4) the update of secret keys and ciphertext is performed in a public way. We show the merits of our scheme by comparing it with the related works, and further implement it to demonstrate its practicality. In addition, the proposed scheme is proven secure in the random oracle model.

CONCLUSION

In this paper, to build a secure and cost-effective multiauthority attribute-based access control scheme for data sharing in cloud storage systems, we proposed a multiauthority CP-ABE scheme supporting scalable user revocation and public ciphertext update. The proposed scheme achieves the intended security properties Any Query Call Us: 9566355386

 

of forward security and backward security, and can also withstand decryption key exposure. We proved the security of the proposed scheme in the random oracle model. Both performance discussions and implementation experiments show that our scheme is more desirable for practical applications.

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

• System : Pentium IV 2.4 GHz.

• Hard Disk : 40 GB.

• Floppy Drive : 1.44 Mb.

• Monitor : 15 VGA Colour.

• Mouse : Logitech.

• Ram : 512 Mb.

 

SOFTWARE REQUIREMENTS:

• Operating system : - Windows XP/7.

• Coding Language : JAVA/J2EE

• Data Base : MYSQL

 

REFERENCES

[1] A. Sahai and B. Waters, ―Fuzzy identity-based encryption,‖ in Proc. Adv. Cryptol.—EUROCRYPT 2005. New York, NY, USA: Springer, 2005, pp. 457–473.

[2] V. Goyal, O. Pandey, A. Sahai, and B.Waters, ―Attribute-based encryption for fine-grained access control of encrypted data,‖ in Proc. 13th ACMConf. Comput. Commun. Security, 2006, pp. 89–98. Any Query Call Us: 9566355386

 

[3] J. Bethencourt, A. Sahai, and B.Waters, ―Ciphertext-policy attribute-basedencryption,‖ in Proc. IEEE Security Privacy 2007, 2007, pp. 321–334.