top of page

Cloud computing is an emerging technology in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, also brings forth new challenges like data security and access control when users outsource data. To keep sensitive user data confidential, existing solutions apply cryptographic methods. In this paper, we propose hierarchical attribute-based encryption by extending cipher text-policy attribute-set based encryption (ASBE) with a hierarchical structure of users. This system achieves scalability by hierarchical structure and also inherits flexibility and fine-grained access control in support with the compound attributes of Attribute set based encryption. Also, this system employs multiple value assignments for access expiration time to deal with user revocation more efficiently than existing schemes. While dealing with the access control for the outsourced data this scheme prove that it is both efficient and flexible, thereby the performance analysis, computational complexity and encapsulated security is being managed by the cloud server which comprises the hierarchical attribute schema.

In Recent years, Cloud computing is one of the most prominent technology. This research investigates Security area in the domain of Cloud Computing. The term safety includes two important key factor Confidentiality and secure Data storage in cloud. On one hand this Cloud computing as a service on demand brings forth many challenges and open issues such as security, confidentiality, and integrity and privacy access control into concerns.  First, in order to keep this confidential information’s safe, the existing system apply cryptographic method. Secondly, load balancing of the server is managed by centralized Attribute based structure of user’s access to data. Third, the users should be able to access all the privileged information’s without delay from cloud storage provider. In Existing System, the first and second scenario is illustrated by the attribute-based encryption and user revocation that achieves scalability and minimize the workload deficiency of cloud servers. Also, extends to flexibility and fine-grained access control by supporting compound attributes of Attribute set based encryption (ASBE) thereby reducing the file retrieval delay. On the other hand, this paper proposes the data storage issue in terms of security. Increased cloud data usage decreases the cloud server storage capacity and it leads to the organization to opt for Public cloud storage services. When User feels to switch over reliable service provider across cloud it results with vendor lock-in as well additional charges for new API and switching. In this Paper, Further improvements in performance of the system are achieved through Decentralized Access Control Scheme for secure data storage that supports reliable access control among the multiple servers. Finally the results may suggest that the use of Decentralized Access along with attribute based schema experimenting under a wide range of cloud storage providers, ensures its scalability and reliability of data storage in cloud computing.

 

A HIERARCHICAL ATTRIBUTE BASED ACCESS CONTROL IN CLOUD COMPUTING

B.Tech INFORMATION TECHNOLOGY, Chennai, India, 2013

A Hierarchical attribute based access control for Decentralized secure and reliable storage in cloud computing

MSc in Computing (Advanced Software Development), Dublin, Ireland, 2014

bottom of page