A Review on Multilevel Approaches for Security in Cloud by Using ABE

Authors

  • Akhilesh Kumar Soni M.Tech Scholar Department of Computer Sciecne& Engineering SIRT-Excellecne, Bhopal Author
  • Nitya Khare Associate Professor Department of Computer Sciecne& Engineering SIRT-Excellecne, Bhopal, Author

Keywords:

Cloud computing, Data sharing, Data confidentiality, Security, ABE, Access controls

Abstract

Public Key Encryption acts as the basic  technique for ABE where it provides one to many  encryptions, here, the private key of users & the cipher text both rely on attributes such that, when the set of the  attributes of users key matches set of attributes of  cipher-text with its corresponding access policy, only  then decryption is possible. Thus, an opponent could  grant access to the sensitive information that holds  multiple keys, if it has at least one individual key for  accession. Medical organizations find it challenging to  adopt cloud-based electronic medical records services,  due to the risk of data breaches and the resulting  compromise of patient data. Hence there is a need of  developing a proper authorization delegation mechanism  for safe, secure and easy cloud-based EHR  management.In this research work a centralized,  attribute based authorization mechanism is developed  that uses Attribute Based Encryption (ABE) and allows  for delegated secure access of patient records.  

Downloads

Download data is not yet available.

References

Maithilee Joshi, Karuna P. Joshi and Tim Finin, “Attribute Based Encryption for Secure Access to Cloud Based EHR Systems”, IEEE, International Conference on Cloud Computing, 2018.

Priya, A., and Tiwari, R., “A Survey: Attribute Based Encryption for Secure Cloud”, IJOSTHE, 5(3), 12, 2018.

https://doi.org/https://doi.org/10.24113/ojssports.v5i3.70 .

Yong Yu, Yannan Li, Bo Yang, Willy Susilo, Guoming Yang and Jian Bai, “Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage”, IEEE Transaction on Emerging Topics in Computing, Vol. 14, No. 8, 2017.

Y. Li, Y. Yu, G. Min, W. Susilo, J. Ni, K-K. R. Choo. “Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems”. IEEE Transactions on Dependable and Secure Computing, 2017.

Ming-quanHong,Wen-bo Zhao, Peng-yu Wang, “Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing”, IEEE, 2016.

Yong Yu · Man Ho Au · Yi Mu · Shaohua Tang · Jian Ren · Willy Susilo · Liju Dong, “Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage”, Springer, 2014.

Sadia Marium, Qamar Nazir, Aftab Ahmed, SairaAhthasham Mirza AamirMehmood,” Implementation of Eap with RSA for Enhancing The Security of Cloud Computing”, International Journal of Basic and Applied Sciences, pp 177-183, 2012.

Saira Varghese, S.Maria Celestin Vigila,” A Comparative Analysis on Cloud Data Security”, Proceedings of 2015 Global Conference on Communication Technologies, pp 507-510,IEEE, 2015.

RohiniVidhate, V.D. Shinde,” Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI” International Journal of Multidisciplinary Research and Development, Volume: 2, Issue: 7, pp 20-27,July 2015.

Cheng-Kang Chu, Sherman S.M. Chow, Wen GueyTzeng, Jianying Zhou, and Robert H. Deng, “Key Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage”, IEEE Transactions On Parallel And Distributed Systems, Vol. 25, No. 2,pp 468-477, February 2014.

G. Yamamoto, S. Oda, K. Aoki. “Fast integrity for large data”. Proc. ECRYPT workshop Software Performance Enhancement for Encryption and Decryption. Amsterdam, Netherlands 2007, 21-32.

Cong Wang, Member, IEEE, Sherman S.M. Chow, Qian Wang, Member, IEEE, Kui Ren, Senior Member, IEEE, and Wenjing Lou, Senior Member, IEEE, “Privacy Preserving Public Auditing for Secure Cloud Storage” IEEE Transactions on Computers, vol. 62, no. 2, February 2013.

Downloads

Published

2019-01-01

How to Cite

A Review on Multilevel Approaches for Security in Cloud by Using ABE . (2019). International Journal of Innovative Research in Computer Science & Technology, 7(2), 18–21. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/13369