Privacy preserved secured outsourced cloud data access control scheme with efficient multi-authority attribute based signcryption

2020 ◽  
Vol 16 (4) ◽  
pp. 409-432
Author(s):  
Somen Debnath ◽  
Bubu Bhuyan ◽  
Anish Kumar Saha

Privacy preserved outsourced data access control is a hard task under the control of third–party storage server. To overcome obstacles in the third party based scenario, Attribute-based signcryption system with bilinear pairing tool is one of the most suitable methods in cloud. It maintains the basic features of security like, authenticity, confidentiality, public verifiability, owner privacy, etc. Although, this method has some challenges like a centralized authority used for user secret key generation for de-signcryption operation, and lack in competent attribute revocation. To overcome the issues, we have proposed a scheme of attribute revocable privacy preserved outsourced based data access control mechanism using Attribute-based signcryption. The proposed method allows multi-authorities for assigning both attribute and secret keys for users along with trusted certified authority, which provides security parameters. The analysis of the proposed method shows less computation cost in decryption and authentication verification. The almost same performance and efficiency is found while comparing with the existing schemes after adding new features.

2020 ◽  
Vol 76 (8) ◽  
pp. 6040-6064
Author(s):  
R. Mythili ◽  
Revathi Venkataraman ◽  
T. Sai Raj

2017 ◽  
Vol 5 (10) ◽  
pp. 373-376
Author(s):  
Thirumanapally Prashanth ◽  
◽  
◽  
Gundu Purna Chandar Rao

2020 ◽  
Vol 10 (1) ◽  
pp. 64-84 ◽  
Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Cloud computing has introduced a paradigm which support data outsourcing to third parties for processing using commodity clusters. It allows the owner to outsource sensitive data and share it with the authorized user while reducing the computation and management cost. Since owners store sensitive data over the cloud, the requirements of access control and data security have also been increasing. To alleviate all the problem requirements, the need has arisen for providing a safe, secure, and sound model. The existing solutions for these problems use pure cryptographic techniques, which increases the computation cost. In this article, the security problems are solved by using a trusted third party and a quorum of key managers. A service provider is responsible for capability-based access control to ensure that only authorized users will be able to access the data. Whenever any data revocation is required, the data owner simply updates this information to the master key manager to revoke a specific number of shares. The model for the proposed work has been presented and its analysis shows how it introduces security features.


Sign in / Sign up

Export Citation Format

Share Document