15Apr 2018

TIME BASED SECURE DATA HANDLING IN PUBLIC CLOUD.

  • UG Students, CSE Department,
  • B.S.A.Crescent Institute of Science and Technology.
  • Assistant Professor Sr.Gr, B.S.A.Crescent Institute of Science and Technology.
  • Professor,, B.S.A.Crescent Institute of Science and Technology.
  • Abstract
  • Keywords
  • References
  • Cite This Article as
  • Corresponding Author

Data sharing in the cloud faces many challenges on security and privacy. Cloud computing is preferred as it reduces cost for data management and its available resources. To protect data from third party cloud server, it is necessary to have an efficient data access control. There are many studies deals with fine grained data access control, but there is no proposed scheme for both access control and time-sensitive data with learning-based methods. Cipher text-Policy Attribute-based Encryption is used for data security in cloud. A time access control is necessary to handle time-sensitive data in public cloud storage. Apart from access control, it is also necessary to have user revocation for efficient access control. An effective solution is needed to let data owners upload the encrypted data using algorithm with time limit such that the intended users cannot access the data beyond the corresponding time. The data that are collected from the software agents will automatically determine the ideal behavior within the specific context in order to maximize the data owner's performance.


  1. Jianan Hong, KaipingXue, YingjieXue, Weikeng Chen, David S.L. Wei, Nenghai Yu and PeilinHong,?TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud?, IEEE Transactions on Services Computing, pp. 1939-1374, 2017.
  2. ShardhaPorwal?,Sangeeta Mittal, ?Implementation of Ciphertext Policy-Attribute Based Encryption (CP-ABE) for fine grained access control of university data?, Contemporary Computing (IC3), Tenth International Conference ,2017.
  3. VangaOdelu , Ashok Kumar Das , ?Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography?,ACM Journal on Security and Communication Networks, Vol. 9 no. 17, November 2016.
  4. Albert Y. Zomaya, Fellow, IEEE,Athanasios V. Vasilakos, Senior Member, IEEE, Eraj Khan, Samee U. Khan, RevathiDhamotharan,Senior Member, IEEE, Keqin Li, Fellow, IEEE, Mazhar Ali, Student? Member,?SeDaSC: Secure Data Sharing in Clouds? ,IEEE Systems Journal, vol. 11,no. 3,pp. 395?? 404,2016.
  5. AkshitaBhandar, Ashutosh Gupta?, Debasis Das, ?Secure algorithm for cloud computing and its applications?, ?Cloud System and Big Data Engineering (Confluence), 6th International Conference,2016.
  6. Qin, H. Xiong, S. Wu, and J. Batamuliza, ?A survey of proxy re-encryption for secure data sharing in cloud computing?, IEEE Transactions on Services Computing, 2014.
  7. Zhiguo Wan, Jun?e Liu, and Robert H. Deng, Senior Member, IEEE, ?HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing?,IEEE Transactions on Information Forensics and Security, Vol.7, no.2, 2012.
  8. Ahmed Albugmi,Madini O. Alassafi , Robert Walters, Gary Wills,?Data Security in Cloud Computing?, Fifth International Conference on Future Generation Communication Technologies,2016.
  9. PachipalaYellamma, ChallaNarasimham, Velagapudisreenivas,? Data Security In Cloud Using RSA?, Computing, Communications and Networking Technologies (ICCCNT), Fourth International Conference,2013.
  10. Vishal R. Pancholi,Dr. Bhadresh P. Patel, ?Enhancement of Cloud Computing Security with Secure Data Storage using AES?,International Journal for Innovative Research in Science & Technology,Vol. 2,no. 09 ,2016.
  11. Akshat Kumar Dixit, Dr.Charu, ?Multilevel Security framework for Cloud Data?,Computing and Communication Technologies for Smart Nation (IC3TSN), International Conference,2017.
  12. Ming Li?,ShuchengYu?,YaZheng?,?Kui Ren?,WenjingLou,?Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption?, IEEE Transactions on Parallel and Distributed Systems,vol. 24,no. 1,2012.
  13. Deval Bhamare?, Tara Salman?,Mohammed Samaka?,?AimanErbad?,?Raj Jain, ?Feasibility of Supervised Machine Learning for Cloud Security?, Information Science and Security (ICISS), International Conference,2016.

[K. Noorin Rahila, L. Nivedha and R. Narayani and W. Aisha Banu. (2018); TIME BASED SECURE DATA HANDLING IN PUBLIC CLOUD. Int. J. of Adv. Res. 6 (Apr). 887-895] (ISSN 2320-5407). www.journalijar.com


Noorin Rahila , Nivedha
B.S.Abdur Rahman crescent Institue of science and Technology

DOI:


Article DOI: 10.21474/IJAR01/6925      
DOI URL: https://dx.doi.org/10.21474/IJAR01/6925