IJCNIS Vol. 10, No. 11, 8 Nov. 2018
Cover page and Table of Contents: PDF (size: 753KB)
Full Text (PDF, 753KB), PP.1-8
Views: 0 Downloads: 0
Cloud computing, Data confidentiality, Data Security, ABE, KP-ABE, Time specification and Access control
Cloud computing presents a vast area for distributed computing where integrated data centres provide resources for immense and scalable distribution of confidential data. Conceptually, cloud applications being offered, information security and its confidentiality become a vital issue to the cloud. So, as to craft certain security of data at cloud data stowage a design and execution of an algorithmic rule to boost cloud security is planned. With an concept, where the planned algorithmic rule integrates option of three completely different existing algorithms and named RAD cryptography algorithm with most novel and attractive conception of Attribute based encryption (ABE) so as to manage, control access and file sharing management in cloud with its special attribute computing properties. During this analysis, a secure file sharing scheme supported attribute is given. In this Research, during this analysis, work data is encrypted using Hybrid attribute based algorithm i.e. RAD Algorithm which proves its proficiency and effectiveness with respect to security level. If any user wants to access the encrypted information where some authentication credentials also are created based on cipher-text, then it has to evidence itself by providing authentication credentials. Consequently, the planned algorithm offers enriched security along with it diminishes time complexity during encryption and decryption technique for data file.
Bhumika Dahat, Nischol Mishra, Santosh Sahu, "Hybrid KP-ABE Algorithm with Time Bounded Access Control for Cloud Data Security", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.11, pp.1-8, 2018. DOI:10.5815/ijcnis.2018.11.01
[1]Goyal V, Pandey O, Sahai A, Waters B (2006) “Attribute-based encryption for fine-grained access control of encrypted data”. In: Proceedings of the 13th ACM conference on computer and communications security.
[2]Ma J, Lai J, Deng R H, Ding X (2016) “Adaptable key-policy attribute based encryption with time interval.”
[3]Jing L, Xiong L, Licheng W ,Debiao H, Haseeb A, Xinxin N(2017) “Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption”.
[4]Lai J, Deng RH, Yang Y, Weng J (2013) “Adaptable cipher-text policy attribute-based encryption”. In: Pairing-based cryptography— pairing 2013. Springer.
[5]Paterson KG, Quaglia EA (2010) “Time-speci?c encryption”. In: Garay JA, De Prisco R (eds) Security and cryptography for networks. Springer, Berlin.
[6]Green M, Hohenberger S, Waters B (2011) “Outsourcing the decryption of ABE cipher text”.
[7]Huang X, Li J, Li J (2014) “Securely outsourcing attribute-based encryption with check ability”. Transactions on Parallel and Distributed Systems, Vol. 25, No. 8.
[8]Xhafa F, Wang J, Chen X (2014)” An efficient PHR service system supporting fuzzy keyword search and fine-grained access control”.
[9]Nuttapong Attrapadung, Benoit Libert, and Elie de Panafieu(2008)” Expressive Key-Policy Attribute-Based Encryption with Constant-Size Cipher text”.
[10]Chao Li, Bo Lang and Jinmiao Wang(2014) “Outsourced KP-ABE with chosen cipher-text security”.
[11]J. Li, X. Chen, J. Li, C. Jia, J. Ma, and W. Lou, “Fine-grained access control system based on outsourced attribute-based encryption,” in Computer Security–ESORICS 2013. Springer, 2013.
[12]J. Lai, R. H. Deng, C. Guan, and J. Weng, “Attribute-based encryption with veri?able outsourced decryption,” Information Forensics and Security, IEEE Transactions (2013).
[13]Rivest RL, Shamir A, Wagner D A (1996) “Time-lock puzzles and timed release- cryptography.
[14]Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, (2007).
[15]Goyal, V., Jain, A., Pandey, O., Sahai, A. “Bounded Ciphertext Policy Attribute Based Encryption”. In: Aceto, L., Damg?ard, I. Goldberg, L.A., Ing′olfsd′ottir, A., Walukiewicz, I. (eds.) ICALP 2008.
[16]Tysowski, P.K., Hasan, M.A.: Hybrid Attribute-Based Encryption and Re-Encryption for Scalable Mobile Applications in Clouds. Technical Report 13, Centre for Applied Cryptographic Research (CACR), University of Waterloo (2013).
[17]“A Survey On Recent Approaches Combining Cryptography And Steganography” David C. Wayld et al: Computer Science & Information Technology (CS & IT), SIP, CST, ARIA, NLP – 2017 pp. 63– 74.
[18]Anurag Roy, Ashoke Nath “DNA Encryption Algorithm –Scopes And Challenges in Symmetric Key Cryptography” International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 3 (November 2016).
[19]Bonny B. Raj, J. Frank Vijay, T. Mahalakshmi “Secure Data Transfer through DNA Cryptography using Symmetric Algorithm” International Journal of Computer Applications (0975 – 8887) Volume 133 – No.2, January 2016.
[20]Gritti, C., Susilo, W., Plantard, T. & Win, K. (2015). Privacy-preserving encryption scheme using DNA parentage test. Theoretical Computer Science,
[21]Anupriya Aggarwal & Praveen Kanth “Secure Data Transmission Using DNA Encryption” IOSR Journal of Computer Engineering (IOSR-JCE) Volume 16, Issue 2, Ver. II (Mar-Apr. 2014).
[22]A Fatma E. Ibrahim. M. I. Moussa, H. M. Abdalkader “Symmetric Encryption Algorithm based on DNA Computing” International Journal of Computer Applications (Volume 97 No.16, July 2014.
[23]Jaspal Kaur Saini and Harsh K Verma “A Hybrid Approach for Image Security by Combining Encryption and Steganography” Proceedings of IEEE 2013 Second International Conference on Image Information Processing.
[24]Ronak Doshi, Pratik Jain, Lalit Gupta “Steganography and its Applications in Security” International Journal of Modern Engineering Research (IJMER) Vol.2, Issue.6, Nov-Dec. 2012 pp-4634-4638.
[25]Bibhash Roy, Gautam Rakshit, Pratim Singha, Atanu Majumder, Debabrata Datta “An improved Symmetric key cryptography with DNA based strong cipher” IEEE Device and Communication (ICDeCom) 2011 International Conference.
[26]Lai X J, Lu M X, Qin L, et al.“Asymmetric encryption and signature method with DNA technology.” Science China Press and Springer-Verlag Berlin Heidelberg 2010.
[27]Adleman L. “Molecular computation of solutions to combinatorial problems”. Science, 1994.
[28]Dan Boneh, Cristopher Dunworth, and Richard Lipton. "Breaking DES Using a Molecular Computer". Technical Report CS-TR-489-95, Department of Computer Science, Princeton University, USA, 1995.
[29]Ashish Gehani, Thomas LaBean, and John Reif “DNA-Based Cryptography” A preliminary version appears in DIMACS DNA Based Computers V, American Mathematical Society, 2000.
[30]Bokhari et.al, Shallal et.al “Evaluation of Hybrid Encryption Technique to Secure Data during Transmission in Cloud Computing” International Journal of Computer Applications volume -166, no.4 May -2017.