[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3090354.3090388acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdcaConference Proceedingsconference-collections
research-article

Secure confidential big data sharing in cloud computing using KP-ABE

Published: 29 March 2017 Publication History

Abstract

In recent year, cloud computing and big data have become the hottest research topics which attract the attention of researchers due to its potential to provide major benefits to the industry and the community. Currently, the Organizations have a new option to outsource their massive data in the cloud without having to worry about the size of data or the capacity of memory. However, moving confidential and sensitive data from trusted domain of the data owners to public cloud will cause various security and privacy risks. Furthermore, the increasing amount of big data outsourced in the cloud increases the chance of breaching the privacy and security of these data. Despite all the research that has been done in this area, big data storage security and privacy remains one of the major concerns of organizations that adopt the cloud computing and big data technologies. Thus to ensure better data security we need for focus on two major problems which are the access control and encryption policies.
In this paper, we propose a new hybrid model that enhances the security and privacy of big data shared in cloud environment using an access control scheme based on KP-ABE and authentication system. Our approach provides a flexible fine-grained access control of big data stored and shared in the cloud computing such that the encrypted data can only be accessed by authorized users.

References

[1]
Tabaa, Y., & Medouri, A. (2013). "A Learning Analytics System for MOOCs". [IJACSA]. International Journal of Advanced Computer Sciences and Applications, 4(5), 113--119.
[2]
A.R. Khan, "Access Control in Cloud Computing Environment," ARPN Journal of Engineering and Applied Sciences, vol 7, no 5, MAY 2012.
[3]
Syam Kumar Pasupuleti, Subramanian Ramalingam, Rajkumar Buyya, "An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing", Journal of Network and Computer Applications 64 (2016) 12--22.
[4]
N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. Panafieu, C. Ràfols, Attribute-based encryption schemes with constant-size ciphertexts, Theoretical Computer Science, 422(2012): 15--38.
[5]
Shulan Wang, Kaitai Liang, Joseph K. Liu, Member, Attribute-Based Data Sharing Scheme Revisited in Cloud Computing, IEEE, Jianyong Chen, Jianping Yu, Weixin Xie.
[6]
104th United States Congress, "Health Insurance Portability and Accountability Act of 1996 (HIPPA)," Online at http://aspe.hhs.gov/admnsimp/pl104191.htm, 1996.
[7]
Bibin K Onankunju, "Access control in cloud computing", International Journal of Scientific and Research Publications, Volume 3, Issue 9, September 2013.
[8]
A. Sahai, B. Waters, "Fuzzy Identity-Based Encryption", Advances in Cryptology V EUROCRYPT, vol.3494 of LNCS, pp. 457--473, 2005.
[9]
Lewko, Allison, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters. "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption." Advances in Cryptology--EUROCRYPT 2010 (2010): 62--91.
[10]
Chang-Ji WANG, Jian-Fa Luo, "A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext", 2012 Eighth International Conference on Computational Intelligence and Security.
[11]
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters, "Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data".
[12]
Jin Li, Qian Wang, Cong Wang, and Kui Ren, "Enhancing Attribute-Based Encryption with Attribute Hierarchy".
[13]
Guojun Wang, Qin Liu, Jie Wu, "Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services".
[14]
Lubicz D, Sirvent T. Attribute-based broadcast encryption scheme made efficient. Advances in Cryptology: Proceedings of the 1st International Conference on Cryptology in Africa (AFRICACRYPT'08),
[15]
FU Jing-yi, HUANG Qin-long, MA Zhao- feng, YANG Yi- xian, "Secure personal data sharing in cloud computing using attribute-based broadcast encryption", December 2014.
[16]
Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing".

Cited By

View all
  • (2022)Arquitectura de consolidación de la información para seguros de la salud mediante Big DataMemoria Investigaciones en Ingeniería10.36561/ING.23.3(18-31)Online publication date: 20-Dec-2022
  • (2021)Internet of Things Security: A SurveyAdvances in Cyber Security10.1007/978-981-33-6835-4_7(95-117)Online publication date: 5-Feb-2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
BDCA'17: Proceedings of the 2nd international Conference on Big Data, Cloud and Applications
March 2017
685 pages
ISBN:9781450348522
DOI:10.1145/3090354
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Ministère de I'enseignement supérieur: Ministère de I'enseignement supérieur

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 March 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Access Control
  2. Attributed Based Encryption
  3. Authentication
  4. Big Data Security
  5. Cloud Computing
  6. Data Encryption
  7. KP-ABE

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

BDCA'17

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)1
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Arquitectura de consolidación de la información para seguros de la salud mediante Big DataMemoria Investigaciones en Ingeniería10.36561/ING.23.3(18-31)Online publication date: 20-Dec-2022
  • (2021)Internet of Things Security: A SurveyAdvances in Cyber Security10.1007/978-981-33-6835-4_7(95-117)Online publication date: 5-Feb-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media