Secure Big Data Access Control Policies for Cloud Computing Environment
Keywords:
ABE, Big Data, cloud, Cipher, Plain TextAbstract
As the term indicates the Big data it means we are work for the something big or can say something large in the Amount, Data the high volume is known as the big data.Now a Day for storing the data file in the Computer Science Engineering we are used the Hard disk, some of the storage place , these storage device may store the data in a Giga byte capability and Terabyte capability or many more, Now a day we are used the some new technology call the cloud environment. So in this work I am study the big data storing process in the Cloud environment, big data fetching from the cloud in a securer manner. So in this dissertation work I am also include the some information about the existing work and some of the algorithm that war already proposed by the researcher in the various paper. My work is based on the Attribute-Based Encryption(ABE) is promising technique to ensure the end-to-end security of big data in the cloud However, the policy updating has always been a challenging issue when ABE is used to construct access control schemes.
Downloads
References
Puya Ghazizadeh, Ravi Mukkamala & Stephan Olariu, 2013,“Data Integrity Evaluation in Cloud Database-as-a-Service”, IEEE Ninth World Congress on Services,978-0-7695-5024-4/13, DOI 0.1109/SERVICES.2013.40, pp.280-285.
Ling Lang & Lin wang, 2012, “Research on cloud computing and key technologies”, IEEE International Conference on Computer Science and Information Processing (CSIP), 978-1-4673-1411-4/12, pp.863-866
Mohammed A. AlZain & Ben Soh and Eric Pardede, 2013, “A New Approach Using Redundancy Technique to Improve Security in Cloud Computing”, pp. 230-235. [4] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in CCS’06. ACM, 2006, pp. 89–98. [5] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased encryption,” in S&P’07. IEEE, 2007, pp. 321–334.
B. Waters, “Key-policy attribute-based encryption(KP-ABE) An expressive, efficient, and provably secure realization,” in KC’11. Springer, 2011, pp. 53–70.
A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters,“Fully secure functional encryption: Attribute-based Encryption and (hierarchical) inner product encryption(RBAC)” in EUROCRYPT’10. Springer, 2010, pp. 62–91.
A. B. Lewko and B. Waters, “Decentralizing attribute-based encryption,”in EUROCRYPT’11. Springer, 2011, pp. 568–588.
S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in INFOCOM’10.IEEE, 2010, pp. 534–542.
Liang-Ao Zhang et al. “ ABE based Access Control with Authenticated Dynamic Policy Updating in Clouds” International Journal of Security and Its Applications Vol.9, No.8 (2015), pp.95-110 http://dx.doi.org/10.14257/ijsia.2015.9.8.08