Attribute based Encryption and Key Distribution for Secure Storage in Clouds
نویسندگان
چکیده
A new decentralized access control scheme is used for secure data storage in clouds that supports anonymous authentication. According to this scheme a user can create a file and store it securely in the cloud. Decryption will only work if the attributes associated with the decryption key match the policy used to encrypt the message. The cloud verifies the authenticity of the users without knowing the user’s identity before storing data. This scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. This scheme is resilient to replay attacks and supports creation, modification and reading data stored in the cloud. The proposed scheme is resilient to replay attacks. In this scheme Secure Hash algorithm is used for authentication purpose, SHA is the one of several cryptographic hash functions, most often used to verify that a file has been unaltered. The Paillier cryptosystem is a probabilistic asymmetric algorithm for public key cryptography. Paillier algorithm is used for creation of access policy, file accessing and file restoring process.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملCloud Computing 1. Attribute Based Encryption with Privacy Preserving In Clouds
Security and privacy are very important issues in cloud computing. In existing system access control in clouds are centralize d in nature. The scheme uses a symmetric key approach and does not support authentication. Symmetric key algorithm uses same key for both encryption and decryption. The authors take a centralized approach where a single key distribution center (KDC) distributes secret ke...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملSurvey on Decentralized Access Control with Anonymous Authentication of Data Stored in Cloud
This Paper new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the scheme the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. In this study scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. It’s prevents r...
متن کاملBatch Attribute-Based Encryption for Secure Clouds
Cloud storage is widely used by organizations due to its advantage of allowing universal access with low cost. Attribute-based encryption (ABE) is a kind of public key encryption suitable for cloud storage. The secret key of each user and the ciphertext are associated with an access policy and an attribute set, respectively; in addition to holding a secret key, one can decrypt a ciphertext only...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015