SlideShare a Scribd company logo
1 of 5
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1167
Abstract— Cloud computing have high demand due to waste
and huge data usage of clients. The privacy and security
become major concern on the outsourced cloud data storage.
The attribute based encryption schemes are used recently for
access control of outsourced cloud data. It has highly
inflexible in implementing complex access control policies.
The existing work presented Hierarchical attribute set based
Encryption (HASBE) that extended cipher-text policy
attribute set based encryption (ASBE) with hierarchical
structure of users. It used achieve scalability, inherits
flexibility, fine grained access control, and employs multiple
value assignments for access expiration time, and deal with
user revocation efficiently. The performance analysis is
made to evaluate the computational complexity of access
control for outsourced data in cloud computing. However
varying of cloud service provider complicates the
hierarchical access control policies. The proposal presented
an Adaptive Delegation Authority model enhancement to
HASBE. It is used to minimize the complexity of access
control policies in changing cloud service provider. The
delegation authority coordinates the data owners and
consumer for easy and quick data access control. It intimates
the data owners and consumers about the authority
delegation.
The delegation authority sends encryption standards to be
followed thereafter. The simulation is carried with Cloud
simulator using java to testify in the effectiveness of
Adaptive Delegation Authority enhancement to HASBE.
I. INTRODUCTION
Cloud computing is the use of computing resources
(hardware and software) that are delivered as a service over
a network (typically the Internet). The name comes from the
use of a cloud-shaped symbol as an abstraction for the
complex infrastructure it contains in system diagrams.
Cloud computing entrusts remote services with a user's data,
software and computation. Cloud computing improves not
only the speed, but also the quantity and quality of resources
available to your organization. Going beyond the limits of
traditional IT infrastructure and data centers offers you more
choice, flexibility and agility and becomes your competitive
advantage.
Cloud computing has emerged as one of the most influential
paradigms in the IT industry in recent years. Since this new
computing technology requires users to entrust their
valuable data to cloud providers, there have been increasing
security and privacy concerns on outsourced data. Several
schemes employing attribute-based encryption (ABE) have
been proposed for access control of outsourced data in cloud
computing; however, most of them suffer from inflexibility
in implementing complex access control policies. In order to
realize scalable, flexible, and fine-grained access control of
outsourced data in cloud computing, in this paper, we
propose hierarchical attribute-set-based encryption
(HASBE) by extending ciphertext-policy attribute-set-based
encryption (ASBE) with a hierarchical structure of users.
Fig. 1: Cloud Computing
The proposed scheme not only achieves scalability
due to its hierarchical structure, but also inherits flexibility
and fine-grained access control in supporting compound
attributes of ASBE. In addition, HASBE employs multiple
value assignments for access expiration time to deal with
user revocation more efficiently than existing schemes. We
formally prove the security of HASBE based on security of
the ciphertext-policy attribute-based encryption (CP-ABE)
scheme by Bethencourt and analyze its performance and
computational complexity. Several schemes employing
attribute-based encryption (ABE) have been proposed for
access control of outsourced data in cloud computing.
It enables customers with limited computational resources to
outsource their large computation workloads to the cloud,
and economically enjoy the massive computational power,
bandwidth, storage, and even appropriate software that can
be shared in a pay-per-use manner. Despite the tremendous
benefits, security is the primary obstacle that prevents the
wide adoption of this promising computing model,
especially for customers when their confidential data are
consumed and produced during the computation. On the one
hand, the outsourced computation workloads often contain
sensitive information, such as the business financial
records, proprietary research data, or personally identifiable
health information etc.
Distributed computing in cloud is nothing more than
utilizing many networked computers to partition (split it into
many smaller pieces) a question or problem and allow the
network to solve the issue piecemeal. Another instance of
distributed computing, for storage instead of processing
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access
Control in Distributed Cloud Computing
N. R .SINDHU PRIYA1
M.KUMARESAN2
1
M. E. 2
Assistant Professor
1,2
PGP College of Engineering and Technology, Namakkal
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Control in Distributed Cloud Computing
(IJSRD/Vol. 1/Issue 5/2013/033)
All rights reserved by www.ijsrd.com 1168
power, is bit torrent. A torrent is a file that is split into many
pieces and stored on many computers around the internet.
When a local machine wants to access that file, the small
pieces are retrieved and rebuilt. P2P network that send
communication/data packages into multiple pieces across
multiple network routes. Then assemble them in receivers
end. Distributed computing on cloud is nothing but next
generation framework to utilize the maximum value of
resources over distributed architecture
An Adaptive Delegation Authority model to enhance the
HASBE model is used to delegation authority is based on
the criteria of user demand in changing cloud computing
storage service providers. The attribute encryption authority
is delegated to the new domain authority or trusted
authority. The variation of trust authority changes is
attribute encryption key model. Data consumers adapt to the
new authority of access control automatically without any
delay. Newly delegated authority updates the data
consumers and owners regarding access control key policies
in quicker time. Peer cloud computing models delegates
authority of access control management on user demand and
location. The simulation is carried out in distributed cloud
computing scenario to testify authority delegation to
HASBE.
II. LITERATURE SURVEY
Information and Communications Technology (ICT) over
the last half century, there is an increasingly perceived
vision that computing will one day be the 5th utility (after
water, electricity, gas, and telephony). This computing
utility, like all other four existing utilities, will provide the
basic level of computing service that is considered essential
to meet the everyday needs of the general community [1]. A
GSAKMP policy token is a highly flexible data structure
used to define the behavior of a group. The token defines an
exhaustive list of policies (there are over 150 different fields
supporting a wide range of policies and mechanisms). With
small exception, the group is free to define policies
containing as many (or as few) of these fields as is desirable.
Thus, groups with varying abilities and requirements can be
defined through the policy token [2].
Each statement identifies context-sensitive session
requirements. A reconciliation algorithm attempts to identify
a policy instance compliant with the stated requirements.
The correctness of efficient two-policy reconciliation
algorithm is proved, and show by reduction that three or
more policy reconciliation is intractable [3]. UniPro, a
unified scheme is introduced to model protection of
resources, including policies, in trust negotiation. UniPro
improves on previous work by modeling policies as first-
class resources, protecting them in the same way as other
resources, providing fine-grained control over policy
disclosure, and clearly distinguishing between policy
disclosure and policy satisfaction, which gives users more
flexibility in expressing their authorization requirements [4].
In automated trust negotiation (ATN), two parties exchange
digitally signed credentials that contain attribute information
to establish trust and make access control decisions. Because
the information in question is often sensitive, credentials are
protected according to access control policies. In traditional
ATN, credentials are transmitted either in their entirety or
not at all [5]. In the cryptosystem, cipher texts are labeled
with sets of attributes and private keys are associated with
access structures that control which cipher texts a user is
able to decrypt. The applicability of our construction to
sharing of audit-log information is demonstrated and
broadcast encryption. This construction supports delegation
of private keys which subsumes Hierarchical Identity-Based
Encryption (HIBE) [6].
To keep sensitive user data confidential against untrusted
servers, existing solutions usually apply cryptographic
methods by disclosing data decryption keys only to
authorized users. However, in doing so, these solutions
inevitably introduce a heavy computation overhead on the
data owner for key distribution and data management when
fine-grained data access control is desired, and thus do not
scale well [7]. In a ciphertext policy attribute based
encryption system, a user’s private key is associated with a
set of attributes (describing the user) and an encrypted
ciphertext will specify an access policy over attributes. A
user will be able to decrypt if and only if his attributes
satisfy the ciphertext’s policy [8].
Identity-Based Encryption (IBE) scheme is introduced
which is based on Fuzzy Identity-Based Encryption. In
Fuzzy IBE we view an identity as set of descriptive
attributes. A Fuzzy IBE scheme allows for a private key for
an identity, to decrypt a cipher text encrypted with an
identity, if and only if the identities are close to each other
as measured by the “set overlap” distance metric [9]. Cloud
computing, as an emerging computing paradigm, enables
users to remotely store their data into a cloud so as to enjoy
scalable services on-demand. Especially for small and
medium-sized enterprises with limited budgets, they can
achieve cost savings and productivity enhancements by
using cloud-based services to manage projects, to make
collaborations, and the like [10].
Ciphertext-Policy Attribute-Set Based Encryption (CP-
ASBE) is a form of CP-ABE that addresses the above
limitations of CP-ABE by introducing a recursive set based
structure on attributes associated with user keys.
Specifically CP-ASBE allows, User attributes to be
organized into a recursive family of sets and Policies that
can selectively restrict decrypting users to use attributes
from within a single set or allow them to combine attributes
from multiple sets.
III. ADAPTIVE DELEGATION AUTHORITY
ENHANCEMENT TO HASBE FOR EFFICIENT ACCESS
CONTROL IN DISTRIBUTED CLOUD COMPUTING
1. Cloud Computing Services
2. Access Control
3. Hierarchical attributes set encryption
4. Authority delegation
5. Dynamic access control policy
A. Cloud Computing Services
Cloud Computing systems comprises of cloud service
provider and manages cloud to provide data storage. The
data owners encrypt their data files and store in cloud. Data
consumers are downloading and decrypt data files from
cloud for their usage. The domain authorities are managed
by its parent domain authority or trusted authority.
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Control in Distributed Cloud Computing
(IJSRD/Vol. 1/Issue 5/2013/033)
All rights reserved by www.ijsrd.com 1169
Trusted authority is issue authentication to data in the cloud.
Fig. 1: Enhance HASBE model process
The hierarchical organization of the cloud system users is
data owners, data consumers, domain authority, and trusted
authority. Data owners and consumers are not always
online. Cloud service provider, domain and trusted authority
are always in the online. The cloud has abundant storage
capacity and computation power and the data consumer’s
access data file only for reading.
B. Access Control
Trusted authority is responsible to generating and
distributing system parameters and root master keys that
authorizing the top-level domain authorities. The domain
authority is responsible for delegating keys to subordinate
domain authorities at next level or users in its domain. Each
user in the system is assigned a key structure to specify
attributes associated with the user’s decryption key.
C. Hierarchical attributes set encryption
HASBE components are System Setup, Top-Level Domain
Authority Grant, New Domain Authority/User Grant, New
File Creation, User Revocation, File Access, and File
Deletion. Trusted authority calls HASBE algorithm to create
the system public parameters to made public to other parties
for master key and kept secret. HASBE algorithm selects a
bilinear group of prime order with generator and chooses
random exponents. File Access user sends request for data
files stored on the cloud, cloud sends corresponding cipher
texts to the user and user decrypts them by invoking
DECRYPT function to obtain decryption value to decrypt
data files. User Revocation is done to make sure for revoked
user cannot access associated data files. New File Creation
is used to protect data stored on the cloud. The data owner
first encrypts data files and it stores encrypted data files on
the cloud for each file is encrypted with a symmetric data
encryption key in turn encrypted with HASBE. Before
uploading to cloud, data file is processed by the data owner
as to pick a unique ID for the data file and that files are
randomly choose a symmetric data encryption key. Encrypt
the data file that define a tree access structure for the file
and encrypt using HASBE algorithm which returns
Ciphertext. Finally encrypted data file is stored on the cloud
D. Authority delegation
Data consumers demand of various files needs that cause
file access permission a constraint in turn, influence the data
owner to delegate authorization. Data owner provide
temporarily, delegates to the authorization of file access
permission (for data consumers) to intermediary party or
other trusted party in the lower hierarchy. The delegation
authority allocates access permission to data consumers as is
assigned by the higher authority rule delegation for file
attributes in dynamic cloud data access environment. The
attribute encryption authorization is delegated to new
domain authority or trusted authority.
E. Dynamic access control policy
Dynamic nature of trusted authority is enforcing the
attribute encryption key model to be changed as and when
highly demanded. The data consumers get access permission
from new trusted authority that having delegation powers to
allow file access permissions. The access control
automatically changes without any delay and that file access
permission is granted quickly to data consumers. Delegated
authority modifies the access policies of data consumers
based on access control key of data files. Distributed cloud
computing models delegates authority of access control
management on user demand and location.
IV. EXPERIMENTAL RESULTS AND DISCUSSION
Experiment is conducted on Access Control for evaluating
the performance of Adaptive Delegation Authority
Enhancement to HASBE for Efficient Access Control in
Distributed Cloud Computing. Proposed Adaptive
Delegation Authority Enhancement to HASBE for Efficient
Access Control in Distributed Cloud Computing evaluated
with different performance metrics and compare it with
Adaptive Delegation
Authority
Criteria of user
demand
Cloud
computing
storage
Newly delegated authority
updates
Data consumers
and owners
Encryption key model
Performance parameters
Peer cloud computing
Authority delegation
HASBE
Frequenc
y cloud
storage
Data
consumers &
data owners
Access
control
ratio
Response
time
Sparse
range
cloud
data
Enhance
HASBE
model
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Control in Distributed Cloud Computing
(IJSRD/Vol. 1/Issue 5/2013/033)
All rights reserved by www.ijsrd.com 1170
Existing HASBE for access control in cloud computing.
By comparing Existing HASBE for access control, the
experimental results show that Proposed Adaptive
Delegation Authority Enhancement to HASBE.
The performance of Privacy Proposed Adaptive Delegation
Authority Enhancement to HASBE is evaluated by the
following metrics
1. Delegation to Access Control Ratio
2. Response Time for Access Control Policy Alerts
3. Sparse Range of Cloud Data
Number of
Cloud Storage
Providers
Existing HASBE
for Access
Control
Proposed Adaptive
Delegation
Authority model
10 5.4 8.9
20 4.8 7.5
30 3.6 6.2
40 2.7 5.3
50 1.5 4.4
Table 1: Delegation to Access Control Ratio
Fig 2 describes the delegation to access control ratio. X axis
represent the number of cloud storage providers. Whereas Y
axis denotes the delegation to access control ratio using both
the existing HASBE for Access Control and our proposed
Adaptive Delegation Authority Model.
When the number of cloud storage providers increased the
delegation to access control ratio will get decreased. The
Adaptive Delegation Authority Model achieves 20% to 35%
more delegation to access control ratio when compared with
the existing scheme.
Figure 3 demonstrates the response time for access control
policy alerts. X axis represents number of data consumer
and data owners whereas Y axis denotes the response time
for access control policy alerts using both the HASBE for
Access Control and our proposed Adaptive Delegation
Authority Model.
Fig. 3: Delegation to Access Control Ratio
When the number of data consumer and data owners
increased response time for access control policy alerts also
gets increased.
Figure 3 shows the effectiveness of response time for access
control policy alerts over different number of data consumer
and data owners than existing HASBE for Access Control
and our proposed Adaptive Delegation Authority Model.
Adaptive Delegation Authority Model achieves 25% to 45%
less access control policy alerts on response time,
When compared with existing schemes.
Number of
Data
Consumer and
Data Owners
Existing
HASBE for
Access Control
Proposed
Adaptive
Delegation
Authority model
20 30 10
40 38 18
60 46 25
80 52 30
100 69 45
Table 2: Response Time for Access Control Policy Alerts
Fig. 4: Response Time for Access Control Policy Alerts
Number of
Cloud Storage
Providers
Existing
HASBE for
Access Control
Proposed Adaptive
Delegation Authority
model
10 250 500
20 200 400
30 150 300
40 100 200
50 50 100
Table 3: Sparse Range of Cloud Data
Fig. 5: Sparse Range of Cloud Data
Figure 4 demonstrates the sparse range of cloud data. X axis
represents the number of cloud storage providers whereas Y
axis denotes the sparse rage of cloud data using both
HASBE for Access Control and our proposed Adaptive
Delegation Authority Model. When the number of cloud
storage providers decreased number of sparse range of cloud
data also gets decreased. All the curves show a more of less
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Control in Distributed Cloud Computing
(IJSRD/Vol. 1/Issue 5/2013/033)
All rights reserved by www.ijsrd.com 1171
yet steady descendant when cloud storage providers
increases. Figure 4 shows better data for sparse range of
cloud of Adaptive Delegation Authority Model. Adaptive
Delegation Authority Model achieves 40% to 60% more
sparse range of cloud data result.
V. CONCLUSION
In this paper, we introduced the HASBE scheme for
realizing scalable, flexible, and fine-grained access control
in cloud computing. The HASBE scheme seamlessly
incorporates a hierarchical structure of system users by
applying a delegation algorithm to ASBE. HASBE not only
supports compound attributes due to flexible attribute set
combinations, but also achieves efficient user revocation
because of multiple value assignments of attributes. We
formally proved the security of HASBE based on the
security of CP-ABE. Finally, we implemented the proposed
scheme, and conducted comprehensive an Adaptive
Delegation Authority model to enhance the HASBE model.
The delegation authority is based on the criteria of user
demand in changing cloud computing storage service
providers. It is used to overcome attribute encryption
authority is delegated to the new domain authority or trusted
authority.
REFERENCES
[1] Shucheng Yu, Yao Zhen, Kui Ren, Wenjing
Lou,”scalable and secure sharing of personal health
record in cloud computing using Attribute based
encryption”,2012.
[2] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving
secure, scalable, and fine-grained data access control
in cloud computing,” in Proc. IEEE INFOCOM 2010,
2010, pp. 534–542.
[3] G.Wang, Q. Liu, and J.Wu, “Hierarchical attribute-
based encryption for fine-grained access control in
cloud storage services,” in Proc. ACM Conf.
Computer and Communications Security (ACM
CCS), Chicago, IL, 2010.
[4] R. Buyya, C. ShinYeo, J. Broberg, and I. Brandic,
“Cloud computing and emerging it platforms: Vision,
hype, and reality for delivering computing as the 5th
utility,” Future Generation Comput.Syst., vol. 25,
pp.599–616, 2009.
[5] R. Bobba, H. Khurana, and M. Prabhakaran,
“Attribute-sets: A practically motivated enhancement
to attribute-based encryption,” in Proc. ESORICS,
Saint Malo, France, 2009.
[6] R.Buyya, C. S. Yeo, and S. Venugopal. Market-
Oriented Cloud Computing: Vision, Hype, and
Reality forDelivering IT Services as Computing
Utilities. In Proceedings of the 10th IEEE
International Conference on High Performance
Computing and Communications (HPCC 2008),
Dalian, China, Sept. 2008.
[7] J.Bethencourt, A. Sahai, and B. Waters. Ciphertext-
policy attribute-based encryption. IEEE Symposium
on Security and Privacy, 2007.
[8] V. Goyal, O. Pandey, A. Sahai, and B. Waters.
Attribute-based encryption for fine-grained access
control of encrypted data. In ACM Conference on
Computer and Communications Security, pages 89–
98, 2006.
[9] D. Boneh, X. Boyen, and E.-J. Goh. Hierarchical
identity based encryption with constant size
ciphertext. 2005.
[10] C. Cocks. An identity based encryption scheme based
on quadratic residues. In B. Honary, editor, IMA Int.
Conf., volume 2260 of Lecture Notes in Computer
Science, pages 360–363. Springer, 2001.

More Related Content

What's hot

APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
Editor Jacotech
 

What's hot (18)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
V04405122126
V04405122126V04405122126
V04405122126
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
Hierarchical attribute based solution for flexible access control in cloud co...
Hierarchical attribute based solution for flexible access control in cloud co...Hierarchical attribute based solution for flexible access control in cloud co...
Hierarchical attribute based solution for flexible access control in cloud co...
 
C04932125
C04932125C04932125
C04932125
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Paper1
Paper1Paper1
Paper1
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 

Viewers also liked

Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...
Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...
Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...
ijsrd.com
 
Safety Optimization in Bikes
Safety Optimization in BikesSafety Optimization in Bikes
Safety Optimization in Bikes
ijsrd.com
 
A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...
A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...
A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...
ijsrd.com
 

Viewers also liked (16)

Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...
Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...
Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...
 
Design of Efficient High Speed Vedic Multiplier
Design of Efficient High Speed Vedic MultiplierDesign of Efficient High Speed Vedic Multiplier
Design of Efficient High Speed Vedic Multiplier
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Experimental Observation on Reduction of Foot Formation of 4600-M Aluminum Al...
Experimental Observation on Reduction of Foot Formation of 4600-M Aluminum Al...Experimental Observation on Reduction of Foot Formation of 4600-M Aluminum Al...
Experimental Observation on Reduction of Foot Formation of 4600-M Aluminum Al...
 
A Low Power Wearable Physiological Parameter Monitoring System
A Low Power Wearable Physiological Parameter Monitoring SystemA Low Power Wearable Physiological Parameter Monitoring System
A Low Power Wearable Physiological Parameter Monitoring System
 
Web Crawling Using Location Aware Technique
Web Crawling Using Location Aware TechniqueWeb Crawling Using Location Aware Technique
Web Crawling Using Location Aware Technique
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
Design of up converter at 2.4GHz using Analog VLSI with 22nm Technology
Design of up converter at 2.4GHz using Analog VLSI with 22nm TechnologyDesign of up converter at 2.4GHz using Analog VLSI with 22nm Technology
Design of up converter at 2.4GHz using Analog VLSI with 22nm Technology
 
Safety Optimization in Bikes
Safety Optimization in BikesSafety Optimization in Bikes
Safety Optimization in Bikes
 
To Improve the Calorific Value of Cotton Waste by Anaerobic Digestion
To Improve the Calorific Value of Cotton Waste by Anaerobic DigestionTo Improve the Calorific Value of Cotton Waste by Anaerobic Digestion
To Improve the Calorific Value of Cotton Waste by Anaerobic Digestion
 
A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...
A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...
A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...
 
Utilization of Fibers in Construction Industries for Properties Improvement o...
Utilization of Fibers in Construction Industries for Properties Improvement o...Utilization of Fibers in Construction Industries for Properties Improvement o...
Utilization of Fibers in Construction Industries for Properties Improvement o...
 
Design and Implementation of a Real Time Obstacle Avoiding Subsumption Contro...
Design and Implementation of a Real Time Obstacle Avoiding Subsumption Contro...Design and Implementation of a Real Time Obstacle Avoiding Subsumption Contro...
Design and Implementation of a Real Time Obstacle Avoiding Subsumption Contro...
 
A Single-Phase Clock Multiband Low-Power Flexible Divider
A Single-Phase Clock Multiband Low-Power Flexible DividerA Single-Phase Clock Multiband Low-Power Flexible Divider
A Single-Phase Clock Multiband Low-Power Flexible Divider
 
GPS & GSM based Voice Alert System for Blind Person
GPS & GSM based Voice Alert System for Blind PersonGPS & GSM based Voice Alert System for Blind Person
GPS & GSM based Voice Alert System for Blind Person
 
Mathematical Modeling and Simulation of Two Degree of Freedom Quarter Car Model
Mathematical Modeling and Simulation of Two Degree of Freedom Quarter Car ModelMathematical Modeling and Simulation of Two Degree of Freedom Quarter Car Model
Mathematical Modeling and Simulation of Two Degree of Freedom Quarter Car Model
 

Similar to Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Control in Distributed Cloud Computing

A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingEnforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computing
IAEME Publication
 

Similar to Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Control in Distributed Cloud Computing (20)

A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingEnforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computing
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...
 
Reshma.docx
Reshma.docxReshma.docx
Reshma.docx
 
50120140507005 2
50120140507005 250120140507005 2
50120140507005 2
 
50120140507005
5012014050700550120140507005
50120140507005
 
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 

More from ijsrd.com

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 

Recently uploaded (20)

Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Control in Distributed Cloud Computing

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1167 Abstract— Cloud computing have high demand due to waste and huge data usage of clients. The privacy and security become major concern on the outsourced cloud data storage. The attribute based encryption schemes are used recently for access control of outsourced cloud data. It has highly inflexible in implementing complex access control policies. The existing work presented Hierarchical attribute set based Encryption (HASBE) that extended cipher-text policy attribute set based encryption (ASBE) with hierarchical structure of users. It used achieve scalability, inherits flexibility, fine grained access control, and employs multiple value assignments for access expiration time, and deal with user revocation efficiently. The performance analysis is made to evaluate the computational complexity of access control for outsourced data in cloud computing. However varying of cloud service provider complicates the hierarchical access control policies. The proposal presented an Adaptive Delegation Authority model enhancement to HASBE. It is used to minimize the complexity of access control policies in changing cloud service provider. The delegation authority coordinates the data owners and consumer for easy and quick data access control. It intimates the data owners and consumers about the authority delegation. The delegation authority sends encryption standards to be followed thereafter. The simulation is carried with Cloud simulator using java to testify in the effectiveness of Adaptive Delegation Authority enhancement to HASBE. I. INTRODUCTION Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation. Cloud computing improves not only the speed, but also the quantity and quality of resources available to your organization. Going beyond the limits of traditional IT infrastructure and data centers offers you more choice, flexibility and agility and becomes your competitive advantage. Cloud computing has emerged as one of the most influential paradigms in the IT industry in recent years. Since this new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. Several schemes employing attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing; however, most of them suffer from inflexibility in implementing complex access control policies. In order to realize scalable, flexible, and fine-grained access control of outsourced data in cloud computing, in this paper, we propose hierarchical attribute-set-based encryption (HASBE) by extending ciphertext-policy attribute-set-based encryption (ASBE) with a hierarchical structure of users. Fig. 1: Cloud Computing The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility and fine-grained access control in supporting compound attributes of ASBE. In addition, HASBE employs multiple value assignments for access expiration time to deal with user revocation more efficiently than existing schemes. We formally prove the security of HASBE based on security of the ciphertext-policy attribute-based encryption (CP-ABE) scheme by Bethencourt and analyze its performance and computational complexity. Several schemes employing attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing. It enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. Despite the tremendous benefits, security is the primary obstacle that prevents the wide adoption of this promising computing model, especially for customers when their confidential data are consumed and produced during the computation. On the one hand, the outsourced computation workloads often contain sensitive information, such as the business financial records, proprietary research data, or personally identifiable health information etc. Distributed computing in cloud is nothing more than utilizing many networked computers to partition (split it into many smaller pieces) a question or problem and allow the network to solve the issue piecemeal. Another instance of distributed computing, for storage instead of processing Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Control in Distributed Cloud Computing N. R .SINDHU PRIYA1 M.KUMARESAN2 1 M. E. 2 Assistant Professor 1,2 PGP College of Engineering and Technology, Namakkal
  • 2. Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Control in Distributed Cloud Computing (IJSRD/Vol. 1/Issue 5/2013/033) All rights reserved by www.ijsrd.com 1168 power, is bit torrent. A torrent is a file that is split into many pieces and stored on many computers around the internet. When a local machine wants to access that file, the small pieces are retrieved and rebuilt. P2P network that send communication/data packages into multiple pieces across multiple network routes. Then assemble them in receivers end. Distributed computing on cloud is nothing but next generation framework to utilize the maximum value of resources over distributed architecture An Adaptive Delegation Authority model to enhance the HASBE model is used to delegation authority is based on the criteria of user demand in changing cloud computing storage service providers. The attribute encryption authority is delegated to the new domain authority or trusted authority. The variation of trust authority changes is attribute encryption key model. Data consumers adapt to the new authority of access control automatically without any delay. Newly delegated authority updates the data consumers and owners regarding access control key policies in quicker time. Peer cloud computing models delegates authority of access control management on user demand and location. The simulation is carried out in distributed cloud computing scenario to testify authority delegation to HASBE. II. LITERATURE SURVEY Information and Communications Technology (ICT) over the last half century, there is an increasingly perceived vision that computing will one day be the 5th utility (after water, electricity, gas, and telephony). This computing utility, like all other four existing utilities, will provide the basic level of computing service that is considered essential to meet the everyday needs of the general community [1]. A GSAKMP policy token is a highly flexible data structure used to define the behavior of a group. The token defines an exhaustive list of policies (there are over 150 different fields supporting a wide range of policies and mechanisms). With small exception, the group is free to define policies containing as many (or as few) of these fields as is desirable. Thus, groups with varying abilities and requirements can be defined through the policy token [2]. Each statement identifies context-sensitive session requirements. A reconciliation algorithm attempts to identify a policy instance compliant with the stated requirements. The correctness of efficient two-policy reconciliation algorithm is proved, and show by reduction that three or more policy reconciliation is intractable [3]. UniPro, a unified scheme is introduced to model protection of resources, including policies, in trust negotiation. UniPro improves on previous work by modeling policies as first- class resources, protecting them in the same way as other resources, providing fine-grained control over policy disclosure, and clearly distinguishing between policy disclosure and policy satisfaction, which gives users more flexibility in expressing their authorization requirements [4]. In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Because the information in question is often sensitive, credentials are protected according to access control policies. In traditional ATN, credentials are transmitted either in their entirety or not at all [5]. In the cryptosystem, cipher texts are labeled with sets of attributes and private keys are associated with access structures that control which cipher texts a user is able to decrypt. The applicability of our construction to sharing of audit-log information is demonstrated and broadcast encryption. This construction supports delegation of private keys which subsumes Hierarchical Identity-Based Encryption (HIBE) [6]. To keep sensitive user data confidential against untrusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. However, in doing so, these solutions inevitably introduce a heavy computation overhead on the data owner for key distribution and data management when fine-grained data access control is desired, and thus do not scale well [7]. In a ciphertext policy attribute based encryption system, a user’s private key is associated with a set of attributes (describing the user) and an encrypted ciphertext will specify an access policy over attributes. A user will be able to decrypt if and only if his attributes satisfy the ciphertext’s policy [8]. Identity-Based Encryption (IBE) scheme is introduced which is based on Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A Fuzzy IBE scheme allows for a private key for an identity, to decrypt a cipher text encrypted with an identity, if and only if the identities are close to each other as measured by the “set overlap” distance metric [9]. Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and medium-sized enterprises with limited budgets, they can achieve cost savings and productivity enhancements by using cloud-based services to manage projects, to make collaborations, and the like [10]. Ciphertext-Policy Attribute-Set Based Encryption (CP- ASBE) is a form of CP-ABE that addresses the above limitations of CP-ABE by introducing a recursive set based structure on attributes associated with user keys. Specifically CP-ASBE allows, User attributes to be organized into a recursive family of sets and Policies that can selectively restrict decrypting users to use attributes from within a single set or allow them to combine attributes from multiple sets. III. ADAPTIVE DELEGATION AUTHORITY ENHANCEMENT TO HASBE FOR EFFICIENT ACCESS CONTROL IN DISTRIBUTED CLOUD COMPUTING 1. Cloud Computing Services 2. Access Control 3. Hierarchical attributes set encryption 4. Authority delegation 5. Dynamic access control policy A. Cloud Computing Services Cloud Computing systems comprises of cloud service provider and manages cloud to provide data storage. The data owners encrypt their data files and store in cloud. Data consumers are downloading and decrypt data files from cloud for their usage. The domain authorities are managed by its parent domain authority or trusted authority.
  • 3. Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Control in Distributed Cloud Computing (IJSRD/Vol. 1/Issue 5/2013/033) All rights reserved by www.ijsrd.com 1169 Trusted authority is issue authentication to data in the cloud. Fig. 1: Enhance HASBE model process The hierarchical organization of the cloud system users is data owners, data consumers, domain authority, and trusted authority. Data owners and consumers are not always online. Cloud service provider, domain and trusted authority are always in the online. The cloud has abundant storage capacity and computation power and the data consumer’s access data file only for reading. B. Access Control Trusted authority is responsible to generating and distributing system parameters and root master keys that authorizing the top-level domain authorities. The domain authority is responsible for delegating keys to subordinate domain authorities at next level or users in its domain. Each user in the system is assigned a key structure to specify attributes associated with the user’s decryption key. C. Hierarchical attributes set encryption HASBE components are System Setup, Top-Level Domain Authority Grant, New Domain Authority/User Grant, New File Creation, User Revocation, File Access, and File Deletion. Trusted authority calls HASBE algorithm to create the system public parameters to made public to other parties for master key and kept secret. HASBE algorithm selects a bilinear group of prime order with generator and chooses random exponents. File Access user sends request for data files stored on the cloud, cloud sends corresponding cipher texts to the user and user decrypts them by invoking DECRYPT function to obtain decryption value to decrypt data files. User Revocation is done to make sure for revoked user cannot access associated data files. New File Creation is used to protect data stored on the cloud. The data owner first encrypts data files and it stores encrypted data files on the cloud for each file is encrypted with a symmetric data encryption key in turn encrypted with HASBE. Before uploading to cloud, data file is processed by the data owner as to pick a unique ID for the data file and that files are randomly choose a symmetric data encryption key. Encrypt the data file that define a tree access structure for the file and encrypt using HASBE algorithm which returns Ciphertext. Finally encrypted data file is stored on the cloud D. Authority delegation Data consumers demand of various files needs that cause file access permission a constraint in turn, influence the data owner to delegate authorization. Data owner provide temporarily, delegates to the authorization of file access permission (for data consumers) to intermediary party or other trusted party in the lower hierarchy. The delegation authority allocates access permission to data consumers as is assigned by the higher authority rule delegation for file attributes in dynamic cloud data access environment. The attribute encryption authorization is delegated to new domain authority or trusted authority. E. Dynamic access control policy Dynamic nature of trusted authority is enforcing the attribute encryption key model to be changed as and when highly demanded. The data consumers get access permission from new trusted authority that having delegation powers to allow file access permissions. The access control automatically changes without any delay and that file access permission is granted quickly to data consumers. Delegated authority modifies the access policies of data consumers based on access control key of data files. Distributed cloud computing models delegates authority of access control management on user demand and location. IV. EXPERIMENTAL RESULTS AND DISCUSSION Experiment is conducted on Access Control for evaluating the performance of Adaptive Delegation Authority Enhancement to HASBE for Efficient Access Control in Distributed Cloud Computing. Proposed Adaptive Delegation Authority Enhancement to HASBE for Efficient Access Control in Distributed Cloud Computing evaluated with different performance metrics and compare it with Adaptive Delegation Authority Criteria of user demand Cloud computing storage Newly delegated authority updates Data consumers and owners Encryption key model Performance parameters Peer cloud computing Authority delegation HASBE Frequenc y cloud storage Data consumers & data owners Access control ratio Response time Sparse range cloud data Enhance HASBE model
  • 4. Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Control in Distributed Cloud Computing (IJSRD/Vol. 1/Issue 5/2013/033) All rights reserved by www.ijsrd.com 1170 Existing HASBE for access control in cloud computing. By comparing Existing HASBE for access control, the experimental results show that Proposed Adaptive Delegation Authority Enhancement to HASBE. The performance of Privacy Proposed Adaptive Delegation Authority Enhancement to HASBE is evaluated by the following metrics 1. Delegation to Access Control Ratio 2. Response Time for Access Control Policy Alerts 3. Sparse Range of Cloud Data Number of Cloud Storage Providers Existing HASBE for Access Control Proposed Adaptive Delegation Authority model 10 5.4 8.9 20 4.8 7.5 30 3.6 6.2 40 2.7 5.3 50 1.5 4.4 Table 1: Delegation to Access Control Ratio Fig 2 describes the delegation to access control ratio. X axis represent the number of cloud storage providers. Whereas Y axis denotes the delegation to access control ratio using both the existing HASBE for Access Control and our proposed Adaptive Delegation Authority Model. When the number of cloud storage providers increased the delegation to access control ratio will get decreased. The Adaptive Delegation Authority Model achieves 20% to 35% more delegation to access control ratio when compared with the existing scheme. Figure 3 demonstrates the response time for access control policy alerts. X axis represents number of data consumer and data owners whereas Y axis denotes the response time for access control policy alerts using both the HASBE for Access Control and our proposed Adaptive Delegation Authority Model. Fig. 3: Delegation to Access Control Ratio When the number of data consumer and data owners increased response time for access control policy alerts also gets increased. Figure 3 shows the effectiveness of response time for access control policy alerts over different number of data consumer and data owners than existing HASBE for Access Control and our proposed Adaptive Delegation Authority Model. Adaptive Delegation Authority Model achieves 25% to 45% less access control policy alerts on response time, When compared with existing schemes. Number of Data Consumer and Data Owners Existing HASBE for Access Control Proposed Adaptive Delegation Authority model 20 30 10 40 38 18 60 46 25 80 52 30 100 69 45 Table 2: Response Time for Access Control Policy Alerts Fig. 4: Response Time for Access Control Policy Alerts Number of Cloud Storage Providers Existing HASBE for Access Control Proposed Adaptive Delegation Authority model 10 250 500 20 200 400 30 150 300 40 100 200 50 50 100 Table 3: Sparse Range of Cloud Data Fig. 5: Sparse Range of Cloud Data Figure 4 demonstrates the sparse range of cloud data. X axis represents the number of cloud storage providers whereas Y axis denotes the sparse rage of cloud data using both HASBE for Access Control and our proposed Adaptive Delegation Authority Model. When the number of cloud storage providers decreased number of sparse range of cloud data also gets decreased. All the curves show a more of less
  • 5. Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Control in Distributed Cloud Computing (IJSRD/Vol. 1/Issue 5/2013/033) All rights reserved by www.ijsrd.com 1171 yet steady descendant when cloud storage providers increases. Figure 4 shows better data for sparse range of cloud of Adaptive Delegation Authority Model. Adaptive Delegation Authority Model achieves 40% to 60% more sparse range of cloud data result. V. CONCLUSION In this paper, we introduced the HASBE scheme for realizing scalable, flexible, and fine-grained access control in cloud computing. The HASBE scheme seamlessly incorporates a hierarchical structure of system users by applying a delegation algorithm to ASBE. HASBE not only supports compound attributes due to flexible attribute set combinations, but also achieves efficient user revocation because of multiple value assignments of attributes. We formally proved the security of HASBE based on the security of CP-ABE. Finally, we implemented the proposed scheme, and conducted comprehensive an Adaptive Delegation Authority model to enhance the HASBE model. The delegation authority is based on the criteria of user demand in changing cloud computing storage service providers. It is used to overcome attribute encryption authority is delegated to the new domain authority or trusted authority. REFERENCES [1] Shucheng Yu, Yao Zhen, Kui Ren, Wenjing Lou,”scalable and secure sharing of personal health record in cloud computing using Attribute based encryption”,2012. [2] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. IEEE INFOCOM 2010, 2010, pp. 534–542. [3] G.Wang, Q. Liu, and J.Wu, “Hierarchical attribute- based encryption for fine-grained access control in cloud storage services,” in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Chicago, IL, 2010. [4] R. Buyya, C. ShinYeo, J. Broberg, and I. Brandic, “Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Generation Comput.Syst., vol. 25, pp.599–616, 2009. [5] R. Bobba, H. Khurana, and M. Prabhakaran, “Attribute-sets: A practically motivated enhancement to attribute-based encryption,” in Proc. ESORICS, Saint Malo, France, 2009. [6] R.Buyya, C. S. Yeo, and S. Venugopal. Market- Oriented Cloud Computing: Vision, Hype, and Reality forDelivering IT Services as Computing Utilities. In Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications (HPCC 2008), Dalian, China, Sept. 2008. [7] J.Bethencourt, A. Sahai, and B. Waters. Ciphertext- policy attribute-based encryption. IEEE Symposium on Security and Privacy, 2007. [8] V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In ACM Conference on Computer and Communications Security, pages 89– 98, 2006. [9] D. Boneh, X. Boyen, and E.-J. Goh. Hierarchical identity based encryption with constant size ciphertext. 2005. [10] C. Cocks. An identity based encryption scheme based on quadratic residues. In B. Honary, editor, IMA Int. Conf., volume 2260 of Lecture Notes in Computer Science, pages 360–363. Springer, 2001.