Secure Big Data Access Control Policies for Cloud Computing Environment

Authors

  • Taniya Jain M.Tech Scholar), Asst. Prof. Javed Akhtar Khan Department of Computer Science & Engineering, Takshshila Group of Institute, INDIA Author
  • Javed Akhtar Khan (M.Tech Scholar), Asst. Prof. Javed Akhtar Khan Department of Computer Science & Engineering, Takshshila Group of Institute, INDIA Author

Keywords:

ABE, Big Data, cloud, Cipher, Plain Text

Abstract

As the term indicates the Big data it means  we are work for the something big or can say something  large in the Amount, Data the high volume is known as  the big data.Now a Day for storing the data file in the  Computer Science Engineering we are used the Hard  disk, some of the storage place , these storage device  may store the data in a Giga byte capability and  Terabyte capability or many more, Now a day we are  used the some new technology call the cloud  environment. So in this work I am study the big data  storing process in the Cloud environment, big data  fetching from the cloud in a securer manner. So in this  dissertation work I am also include the some  information about the existing work and some of the  algorithm that war already proposed by the researcher  in the various paper. My work is based on the  Attribute-Based Encryption(ABE) is promising  technique to ensure the end-to-end security of big data  in the cloud However, the policy updating has always  been a challenging issue when ABE is used to construct  access control schemes. 

Downloads

Download data is not yet available.

References

Puya Ghazizadeh, Ravi Mukkamala & Stephan Olariu, 2013,“Data Integrity Evaluation in Cloud Database-as-a-Service”, IEEE Ninth World Congress on Services,978-0-7695-5024-4/13, DOI 0.1109/SERVICES.2013.40, pp.280-285.

Ling Lang & Lin wang, 2012, “Research on cloud computing and key technologies”, IEEE International Conference on Computer Science and Information Processing (CSIP), 978-1-4673-1411-4/12, pp.863-866

Mohammed A. AlZain & Ben Soh and Eric Pardede, 2013, “A New Approach Using Redundancy Technique to Improve Security in Cloud Computing”, pp. 230-235. [4] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in CCS’06. ACM, 2006, pp. 89–98. [5] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased encryption,” in S&P’07. IEEE, 2007, pp. 321–334.

B. Waters, “Key-policy attribute-based encryption(KP-ABE) An expressive, efficient, and provably secure realization,” in KC’11. Springer, 2011, pp. 53–70.

A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters,“Fully secure functional encryption: Attribute-based Encryption and (hierarchical) inner product encryption(RBAC)” in EUROCRYPT’10. Springer, 2010, pp. 62–91.

A. B. Lewko and B. Waters, “Decentralizing attribute-based encryption,”in EUROCRYPT’11. Springer, 2011, pp. 568–588.

S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in INFOCOM’10.IEEE, 2010, pp. 534–542.

Liang-Ao Zhang et al. “ ABE based Access Control with Authenticated Dynamic Policy Updating in Clouds” International Journal of Security and Its Applications Vol.9, No.8 (2015), pp.95-110 http://dx.doi.org/10.14257/ijsia.2015.9.8.08

Downloads

Published

2024-03-04

How to Cite

Secure Big Data Access Control Policies for Cloud Computing Environment . (2024). International Journal of Innovative Research in Computer Science & Technology, 5(2), 254–256. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/13499