Delegated Access Control Two Layer Encryption Mechanism In Public Cloud
International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)
Download this PDF format
Cloud computing allows users to store their datas in cloud and those datas can be shared by different users.So the integrity of cloud data is subject to doubt.Current approach used privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. They exploited ring signatures to compute verification metadata needed to audit the correctness of shared data. With this, the identity of the signer in shared data is also kept private from public verifiers. Since the traditional approach is based on ring signatures, where the identity of the signer is unconditionally protected, it does not support traceability.But designing an efficient public auditing mechanism with the capabilities of preserving identity privacy and supporting traceability is still open.So here, we propose a traceability mechanism which means the ability for the group manager (i.e., the original user) to reveal the identity of the signer based on verification metadata in some special situations and data freshness(cloud possess the latest version of data) is also achieved.
 M. Nabeel and E. Bertino, “Privacy Preserving delegated access control on Public Clouds”, IEEE Transactions on Knowledge and Data Engineering, 2013
 M. Nabeel and E. Bertino, “Privacy preserving delegated access control in the storage as a service model,” in EEE International Conference on Information Reuse and Integration(IRI), 2012.
 M. Nabeel, N. Shang, and E. Bertino, “Privacy preserving policy based content sharing in public clouds,” IEEE Transactionson Knowledge and Data Engineering, 2012.
 A .Reddy, GudivadaLokesh and N. Vikram “Privacy Preserving Delegated Access Control in Public Clouds”, International Journal of Computer Science Trends and Tech (IJCST)- Vol. 2 Issue 4, July Aug 2014.
 Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” Proceedings of the 13th ACM conference on Computerand communications security. New York, NY, USA: ACM, pp. 89–98, 2006
 B. Wang, B. Li, and H. Li, “Oruta: Privacy- Preserving Public Auditing for Shared Data in The Proc. IEEE Fifth Int’l Conf. Cloud Computing, pp. 295- 302, 2012.
 C. Wang, Q. Wang, K. Ren, and W, Lou,“Privacy- Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. IEEE INFOCOM, pp.525-533, 2010.
 G. Ateniese, R. Burns, R. Curtmola, J. Herring, L Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf.Computer and Comm. Security (CCS ’07), pp. 598-610, 2007
 H. Shacham and B. Waters, “Compact Proofs of Retrievability,” Proc. 14th Int’l Conf. Theory and Application of Cryptology and Information Security:Advances in Cryptology (ASIACRYPT ’08), pp. 90-107, 2008
 C. Wang, S.S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, vol. 62, no.2, pp. 362-375, Feb. 2013
Traceability, Privacy Preserving, Public Auditing, Shared data.