SlideShare a Scribd company logo
1 of 5
Download to read offline
Shaikh Sadaf, Patil Dipti, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1453
ISSN: 2454-132X
Impact factor: 4.295
(Volume 3, Issue 6)
Available online at www.ijariit.com
Hierarchical Attribute-Based Solution for Flexible Access
Control in Cloud Computing
Sadaf Shaikh
Department of Computer Engineering
Pillai's Institute of Information Technology Engineering,
Media Studies & Research, Navi Mumbai, Maharashtra
nashrashaikh20@gmail.com
Dipti Patil
Department of Computer Engineering
Pillai's Institute of Information Technology Engineering,
Media Studies & Research, Navi Mumbai, Maharashtra
dypatil75@gmail.com
Abstract: Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications
without the burden of local hardware and software management. Though the benefits are clear, such a service is also
relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the
correctness of the data in the cloud. In order to address this new problem and further achieve a secure and dependable cloud
storage service, we propose in this paper we develop a new cryptosystem for fine-grained sharing of encrypted data that we call
Key-Policy Attribute-Based Encryption (KP-ABE). In our cryptosystem, ciphertexts are labelled with sets of attributes and private
keys are associated with access structures that control which cipher texts a user is able to decrypt. Attribute-based encryption
(ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. HASBE
extends the ASBE algorithm with a hierarchical structure to improve scalability and flexibility while at the same time inherits
the feature of fine-grained access control of ASBE.
Keywords: HASBE (Hierarchical Attribute set based Encryption), CPABE (Cipher text- Policy Attribute Based Encryption), MK
(Master Key), PK (Public Key), SK (Secret Key), CT (Cipher Text), CS (Cloud server), CSP (Cloud service provider).
I. INTRODUCTION
The Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the
burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’
physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in the
cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this
paper. We develop a new cryptosystem for fine-grained sharing of encrypted data that we call Key-Policy Attribute-Based
Encryption (KP-ABE). In our cryptosystem, cipher texts are labelled with sets of attributes and private keys are associated with
access structures that control which cipher texts a user is able to decrypt. Attribute-based encryption (ABE) has been envisioned as
a promising cryptographic primitive for realizing secure and flexible access control. HASBE extends the ASBE algorithm with a
hierarchical structure to improve scalability and flexibility while at the same time inherits the feature of fine-grained access control
of ASBE. In cloud computing, users have to be compelled to hand over their knowledge to the cloud service supplier for storage
and business operations, whereas the cloud service supplier could be a business entity which cannot be totally trusted. Knowledge
is a vital plus for any organization, and enterprise users can face a significant issue if its confidential knowledge is disclosed to their
business competitors or the general public. Thus the cloud users within the first place need to create certain that their knowledge is
unbroken confidential to the outsiders together with the cloud suppliers and their potential competitors. This is often the primary
knowledge security demand. Versatile and fine grained access control is additionally powerfully desired within the service oriented
cloud computing model.
A. Objective
The proposed system shows how HASBE extends the ASBE algorithm with a hierarchical structure to improve scalability and
flexibility while at the same time inherits the feature of fine-grained access control of ASBE. Second, we demonstrate how to
implement a full-fledged access control scheme for cloud computing based on HASBE. The scheme provides full support for
hierarchical user access, file creation, file deletion, and user revocation in cloud computing.
Shaikh Sadaf, Patil Dipti, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1454
Third, we formally prove the security of the proposed scheme based on the security of the CP-ABE scheme by analysing its
performance in terms of computational overhead. Lastly, we implemented HASBE system and conducted result analysis
experiments for performance evaluation, and our experiments demonstrate that HASBE gives satisfactory performance. We
also measure the time complexity i.e. time required to upload and download the files on the cloud.
II. LITERATURE REVIEW
The literature survey contains a study of different schemes and research papers available on attribute based encryption scheme.
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in cloud computing.
This paper presents the new scheme i.e. HASBE which provides the flexible and scalable access control in cloud computing.
The HASBE extends the ASBE scheme with hierarchical structure and hence achieves scalability and flexibility.
A Novel Method of HASBE with Improved Efficiency and Delegation Mechanism in Cloud.
The novel method of HASBE introduces in term of delegation mechanism and improved efficiency. It provides efficiently share
confidential data on cloud servers and also involves in the full delegation. The delegation defines that it involved for the transfer
of authority under server permission.
A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control by Separate Encryption/Decryption
in Cloud Computing.
This paper proposes the observation of separating authority is often applied in business management. For example,
responsibility for a company’s finances is divided between the accountant and cashier. In business processes, the accountant is
responsible for keeping accounts, while the cashier is in charge of making payments. By keeping these two functions divide,
the company can prevent the accountant from misrepresenting accounts and embezzling corporate finances. Authorized
documents frequently need to be stamped with two seals (i.e., the corporate seal and the legal representative’s seal), thus
avoiding a staff member from abusing his position to issue fake documents, and these seals are normally delegated to two
dissimilar people. These examples of the division of authority are designed to avoid a concentration of power which could raise
operational risks this paper also proposes the HASBE scheme and operations of the same.
An Enhanced HASBE for Cloud Computing Environment.
This paper proposes advantages of the HASBE scheme and enhancement of the same.
A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments.
In this paper, the survey started from basic attribute-based encryption scheme, followed by monotonic access structure which
could be divided into key-policy attribute-based encryption scheme, cipher text-policy attribute-based encryption scheme.
Attribute-based encryption scheme with non- monotonic structure is introduced. Thereafter, and hierarchical attribute-based
encryption scheme as the end.
GASBE: A Graded Attribute-Based Solution for Access Control in Cloud Computing
This paper proposes the detailed system model of the HASBE scheme. System model consists of CSP, Data owner, Data
consumer, Trusted Authority, Domain Authority.
A Survey on Attribute Based Encryption Scheme in Cloud Computing.
This paper proposes a method of encryption of a data based on the attributes of it.in this trusted authority, authorizes each user. The
ABE proposes two more schemes i.e. KP-ABE and CP- ABE.
III. IMPLEMENTATION
A. System Architecture
The system focuses on a proposed architecture Hierarchical Attribute Set Based Encryption (HASBE); which is derived from
the Cipher Policy attribute-based encryption (CP-ABE) with a hierarchical data structure. This proposed approach not only
achieves scalability, it achieves both flexibility and fine-grained access control of data in the cloud.
Fig 1. System Architecture
Shaikh Sadaf, Patil Dipti, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1455
In Fig. 1, the system consists of five form of parties: a cloud service provider, data owners, data consumers, a number of domain
authorities, and a trusted root authority. The cloud service provider manages a cloud to supply data storage service. Data owners
encrypt or encode their data files and store them in the cloud for sharing with data consumers. To access the shared data files, data
consumers download encrypted data files of their interest from the cloud and then decrypt them. Each data owner/consumer is
administrated by a domain authority. A domain authority is managed by its parent domain authority or the trusted authority. Data
owners, data consumers, domain authorities, and the trusted authority are organized in a hierarchical manner. The proposed HASBE
system expands the attribute based scheme to provide the hierarchical structure of the system. As our system model consists of a
trusted authority, multiple domain authorities, and numerous data owners and consumers. [4]
Fig 2. Format of Data on Cloud
The trusted root authority is responsible for authorizing top level domain authorities. A domain authority is responsible for
authorizing the next level domains or the users in its domain. Each user in the system is allocated a key structure which specifies
the attributes associated with the user’s decryption key. Fig. 3.2 represents data file format of the cloud.
A. ALGORITHMS USED
BLOWFISH ALGORITHM
It has total 16 rounds of encryption. Each round consists of key-dependent permutation and a key and data-dependent
substitution. All the operations are XORed and the addition of 32 bit words. The only additional operations are four indexed
array data lookup tables for each round. Initially, it divides the original message into 64 bit blocks and each 64 bit blocks are
processed individually.
Step1: Initially it divides the 64 bit block into two parts xL and xR of 32 bit each
Step2: At first round, xL is XORed with the subkey p1 sub key and the result of XOR operation is given to Blowfish Function
which again gets XORed with the xR.
Step3: xL and xR both are swapped together.
Step 4: the process continues to 16th
round.
Step 5: After the 16th
round, xR is XORed with the p17 sub key and xL is XORed with the p18 sub key.
Step 6: Result of both XOR opration is combined together to generate 64 bit ciphertext.
Algorithm:
Divide x into two 32-bit parts: xL, xR
For i = 1 to 16
xL=XL XOR Pi
xR=F(XL) XOR xR
Swap XL and xR
Swap XL and xR(undo the last swap)
xR=xR XOR P17
xL=xL XOR P18
Recombine xL and xR
Shaikh Sadaf, Patil Dipti, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1456
Fig 3. Blowfish Algorithm
MAC FOR DATA INTEGRITY
The MAC needed two inputs a message and a secret key known only to the originator of the message. The receiver of the
message verifies the integrity of the message and authenticate that the message sender has the secret key. The Hash function is
used to generate the MAC. The MAC is generated by calculating the hash value of the secret key and a message to be
authenticated. The sender sends the message along with the calculated MAC value which will be encrypted with the secret key.
At the receiver side receiver will decrypt the message with the secret key and again recalculate the MAC and compares it with
the MAC value send by the sender. If the receiver’s calculated MAC and MAC which is sent by the sender is same then the
message is authenticated and the data is verified. We have used Hash MAC (SHA) algorithm for calculating the Hash function.
Definition: HMAC (M) =H [(K+opad) || H(K+ipad) || M]
IV. PERFORMANCE ANALYSIS
We analysed the system based on the time complexity that means the total time required to upload and download the file from the
cloud. To measure the time complexity we have calculated the time required for files based on the size of the file. We have tested
AES and DES Algorithms with our Blowfish algorithm and checked the total time required to AES algorithm, DES algorithm and
total time required for encryption and decryption in Blowfish algorithm for various files. Based on above comparisons we have
found that the Blowfish algorithm works better instead of AES and DES algorithm.
Fig 4. Comparison of Algorithms
Shaikh Sadaf, Patil Dipti, International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 1457
As per the analysis, we have tested we can say that the time required fir AES algorithm is more than the Blowfish algorithm.
For every processed file it generates the new graph which shows the time required for both algorithm and comparison of both
of them.
CONCLUSIONS
We proposed a scheme for providing scalable, efficient and flexible access control in cloud computing. The hierarchical nature
of HASBE scheme provides more scalability than the previous ABE (Attribute Based Encryption) schemes. It not only
supports the compound set of attributes due to flexible attribute set combinations but also achieves efficient user revocation.
We proved that the security of proposed system HASBE is better than the security of CP-ABE and KP-ABE methods.
Finally, we conducted the Result analysis and evaluation, which shows its efficiency and advantages over the existing system.
In the proposed system, we also checked data integrity by using HMAC algorithm, which shows data stored on the cloud is
safe and confidential.
ACKNOWLEDGEMENT
It is a great pleasure and moment of immense satisfaction for me to express my profound gratitude to my dissertation Project Guide,
Prof. Dipti Patil whose constant encouragement enabled me to work enthusiastically. My heartfelt gratitude to the H.O.D of
COMPUTER ENGINEERING Department Prof. Madumita Chatterjee and M.E coordinator Prof. Sharvari Govilkar who have
always been there to help and give their time and advice in spite of their busy schedule. I am also thankful to Dr. R. I. K Moorthy,
Principal, and Pillai college of Engineering, New Panvel, for his encouragement and for providing an outstanding academic
environment, also for providing the adequate facilities. I acknowledge all the staff members of the department of Computer and
Information Technology for their help and suggestions during various phases of this project work.
REFERENCES
1. Minu George1, Dr. C. Suresh Gnanadhas2, Saranya.K3 “A Survey on Attribute Based Encryption Scheme in Cloud Computing”
international Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 11, November 2013.
2. D. Hephzi Rachel1, S. Prathiba2 “An Enhanced HASBE for Cloud Computing Environment” A Monthly Journal of Computer
Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013, pg 396-401.
3. Chandana V.R, Radhika Govankop, Rashmi N and R. Bharathi “GASBE: A GRADED ATTRIBUTE-BASED SOLUTION FOR
ACCESS CONTROL IN CLOUD COMPUTING” International conference on Advances in Computer and Electrical Engineering
(ICACEE 2012) Nov 17-18, 2012 Manila (Philippines).
4. 1S. Gokuldev, 2S.Leelavathi 1Associate Professor, 2PG Scholar 1,2Department of Computer Science and Engineering 1,2SNS
College of Engineering, Coimbatore, India “HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access
Control by Separate Encryption/Decryption in Cloud Computing” International Journal of Engineering science and innovative
Technology, Volume 2, Issue 3, May 2013.
5. Cheng-Chi Lee1, Pei-Shan Chung2, and Min-Shiang Hwang3 “A Survey on Attribute-based Encryption Schemes of Access
Control in Cloud Environments” Department of Computer Science and Information Engineering, Asia Universtiy3 500 Liufeng
Road, Wufeng, Taichung 402, Taiwan, R.O.C. International Journal of Network Security, Vol.15, No.4, PP.231-240, July 2013.
6. MANJEERA PATIL, 2A. SURESH BABU 1PGScholar, JNTU, Pulivendula, 2P.hd, Asso. Professor, JNTU, Pulivendula
“HASBE: A HIERARCHICAL ATTRIBUTE-BASED SOLUTION FOR FLEXIBLE AND SCALABLE ACCESS CONTROL IN
CLOUD COMPUTING” International journal of Electrical, Electronics and Computer system ISSN (online) 2347-2812, Volume -
1, Issue -3, 2013.
7. S. Dhivya bharathi1 S. Sathyalakshmi 2 “A Novel Method of HASBE with Improved Efficiency and Delegation Mechanism in
Cloud” Proc. of the Intl. Conf. on Recent Trends In Computing and Communication Engineering -- RTCCE 2013 Copyright ©
Institute of Research Engineers and Doctors ISBN:978-981-07-6184-4-doi:10.3850/978-981-07-6184-4_16.
8. http://www.slideshare.net/IMPULSE_TECHNOLOGY/hasbe-a-hierarchical-attribute-basedsolution
9. http://www.youtube.com/watch?v=DnBF2rY6vX0/hasbe.html

More Related Content

What's hot

Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
 
Wp esg-5-considerations-hybrid-clouds
Wp esg-5-considerations-hybrid-cloudsWp esg-5-considerations-hybrid-clouds
Wp esg-5-considerations-hybrid-cloudsFaisal Farooq
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...pharmaindexing
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingIOSR Journals
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
 
Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsVijay Karan
 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsVijay Karan
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelIJERA Editor
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & WhereMohammed Sajjad Ali
 
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
Ieeepro techno solutions   2014 ieee java project - distributed, concurrent, ...Ieeepro techno solutions   2014 ieee java project - distributed, concurrent, ...
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...hemanthbbc
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET Journal
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and RetrievalIOSR Journals
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
 

What's hot (20)

Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
 
Wp esg-5-considerations-hybrid-clouds
Wp esg-5-considerations-hybrid-cloudsWp esg-5-considerations-hybrid-clouds
Wp esg-5-considerations-hybrid-clouds
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 Projects
 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projects
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto Model
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & Where
 
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
Ieeepro techno solutions   2014 ieee java project - distributed, concurrent, ...Ieeepro techno solutions   2014 ieee java project - distributed, concurrent, ...
Ieeepro techno solutions 2014 ieee java project - distributed, concurrent, ...
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Cloud Security Mechanisms
Cloud Security MechanismsCloud Security Mechanisms
Cloud Security Mechanisms
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
Paper1
Paper1Paper1
Paper1
 

Similar to Hierarchical attribute based solution for flexible access control in cloud computing

A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...JPINFOTECH JAYAPRAKASH
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudIJMTST Journal
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueIRJET Journal
 
Hasbe a hierarchical attribute based solution
Hasbe a hierarchical attribute based solutionHasbe a hierarchical attribute based solution
Hasbe a hierarchical attribute based solutionIMPULSE_TECHNOLOGY
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsVijay Karan
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsVijay Karan
 
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...JobandeepKaur2
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsVijay Karan
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingSBGC
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based dataASAITHAMBIRAJAA
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based datahemanthbbc
 
Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...IJCSIS Research Publications
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET Journal
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...IJMER
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 

Similar to Hierarchical attribute based solution for flexible access control in cloud computing (20)

A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
 
1
11
1
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
Hasbe a hierarchical attribute based solution
Hasbe a hierarchical attribute based solutionHasbe a hierarchical attribute based solution
Hasbe a hierarchical attribute based solution
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure cloud Data Access and S...
 
M.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing ProjectsM.E Computer Science Cloud Computing Projects
M.E Computer Science Cloud Computing Projects
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computing
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
 
Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...
Enhanced Hybrid Blowfish and ECC Encryption to Secure Cloud Data Access and S...
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 

Recently uploaded

Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...narwatsonia7
 
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Call Girls in Nagpur High Profile
 
(Rocky) Jaipur Call Girl - 9521753030 Escorts Service 50% Off with Cash ON De...
(Rocky) Jaipur Call Girl - 9521753030 Escorts Service 50% Off with Cash ON De...(Rocky) Jaipur Call Girl - 9521753030 Escorts Service 50% Off with Cash ON De...
(Rocky) Jaipur Call Girl - 9521753030 Escorts Service 50% Off with Cash ON De...indiancallgirl4rent
 
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night EnjoyCall Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoybabeytanya
 
Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...
Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...
Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...Miss joya
 
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...Taniya Sharma
 
Bangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% SafeBangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% Safenarwatsonia7
 
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...Garima Khatri
 
Aspirin presentation slides by Dr. Rewas Ali
Aspirin presentation slides by Dr. Rewas AliAspirin presentation slides by Dr. Rewas Ali
Aspirin presentation slides by Dr. Rewas AliRewAs ALI
 
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomLucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomdiscovermytutordmt
 
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore EscortsVIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...astropune
 
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...Taniya Sharma
 
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune) Girls Service
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune)  Girls ServiceCALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune)  Girls Service
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune) Girls ServiceMiss joya
 
Call Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...CALL GIRLS
 
Call Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort Service
Call Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort ServiceCall Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort Service
Call Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort Serviceparulsinha
 
VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...
VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...
VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...Miss joya
 
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night EnjoyCall Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoybabeytanya
 

Recently uploaded (20)

Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...
 
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
 
(Rocky) Jaipur Call Girl - 9521753030 Escorts Service 50% Off with Cash ON De...
(Rocky) Jaipur Call Girl - 9521753030 Escorts Service 50% Off with Cash ON De...(Rocky) Jaipur Call Girl - 9521753030 Escorts Service 50% Off with Cash ON De...
(Rocky) Jaipur Call Girl - 9521753030 Escorts Service 50% Off with Cash ON De...
 
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night EnjoyCall Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
 
Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...
Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...
Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...
 
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
 
Bangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% SafeBangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% Safe
 
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
 
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Servicesauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
 
Aspirin presentation slides by Dr. Rewas Ali
Aspirin presentation slides by Dr. Rewas AliAspirin presentation slides by Dr. Rewas Ali
Aspirin presentation slides by Dr. Rewas Ali
 
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomLucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
 
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore EscortsVIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
 
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
 
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
 
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune) Girls Service
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune)  Girls ServiceCALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune)  Girls Service
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune) Girls Service
 
Call Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
 
Call Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort Service
Call Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort ServiceCall Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort Service
Call Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort Service
 
VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...
VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...
VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...
 
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night EnjoyCall Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
 

Hierarchical attribute based solution for flexible access control in cloud computing

  • 1. Shaikh Sadaf, Patil Dipti, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1453 ISSN: 2454-132X Impact factor: 4.295 (Volume 3, Issue 6) Available online at www.ijariit.com Hierarchical Attribute-Based Solution for Flexible Access Control in Cloud Computing Sadaf Shaikh Department of Computer Engineering Pillai's Institute of Information Technology Engineering, Media Studies & Research, Navi Mumbai, Maharashtra nashrashaikh20@gmail.com Dipti Patil Department of Computer Engineering Pillai's Institute of Information Technology Engineering, Media Studies & Research, Navi Mumbai, Maharashtra dypatil75@gmail.com Abstract: Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in the cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper we develop a new cryptosystem for fine-grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption (KP-ABE). In our cryptosystem, ciphertexts are labelled with sets of attributes and private keys are associated with access structures that control which cipher texts a user is able to decrypt. Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. HASBE extends the ASBE algorithm with a hierarchical structure to improve scalability and flexibility while at the same time inherits the feature of fine-grained access control of ASBE. Keywords: HASBE (Hierarchical Attribute set based Encryption), CPABE (Cipher text- Policy Attribute Based Encryption), MK (Master Key), PK (Public Key), SK (Secret Key), CT (Cipher Text), CS (Cloud server), CSP (Cloud service provider). I. INTRODUCTION The Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in the cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper. We develop a new cryptosystem for fine-grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption (KP-ABE). In our cryptosystem, cipher texts are labelled with sets of attributes and private keys are associated with access structures that control which cipher texts a user is able to decrypt. Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. HASBE extends the ASBE algorithm with a hierarchical structure to improve scalability and flexibility while at the same time inherits the feature of fine-grained access control of ASBE. In cloud computing, users have to be compelled to hand over their knowledge to the cloud service supplier for storage and business operations, whereas the cloud service supplier could be a business entity which cannot be totally trusted. Knowledge is a vital plus for any organization, and enterprise users can face a significant issue if its confidential knowledge is disclosed to their business competitors or the general public. Thus the cloud users within the first place need to create certain that their knowledge is unbroken confidential to the outsiders together with the cloud suppliers and their potential competitors. This is often the primary knowledge security demand. Versatile and fine grained access control is additionally powerfully desired within the service oriented cloud computing model. A. Objective The proposed system shows how HASBE extends the ASBE algorithm with a hierarchical structure to improve scalability and flexibility while at the same time inherits the feature of fine-grained access control of ASBE. Second, we demonstrate how to implement a full-fledged access control scheme for cloud computing based on HASBE. The scheme provides full support for hierarchical user access, file creation, file deletion, and user revocation in cloud computing.
  • 2. Shaikh Sadaf, Patil Dipti, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1454 Third, we formally prove the security of the proposed scheme based on the security of the CP-ABE scheme by analysing its performance in terms of computational overhead. Lastly, we implemented HASBE system and conducted result analysis experiments for performance evaluation, and our experiments demonstrate that HASBE gives satisfactory performance. We also measure the time complexity i.e. time required to upload and download the files on the cloud. II. LITERATURE REVIEW The literature survey contains a study of different schemes and research papers available on attribute based encryption scheme. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in cloud computing. This paper presents the new scheme i.e. HASBE which provides the flexible and scalable access control in cloud computing. The HASBE extends the ASBE scheme with hierarchical structure and hence achieves scalability and flexibility. A Novel Method of HASBE with Improved Efficiency and Delegation Mechanism in Cloud. The novel method of HASBE introduces in term of delegation mechanism and improved efficiency. It provides efficiently share confidential data on cloud servers and also involves in the full delegation. The delegation defines that it involved for the transfer of authority under server permission. A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control by Separate Encryption/Decryption in Cloud Computing. This paper proposes the observation of separating authority is often applied in business management. For example, responsibility for a company’s finances is divided between the accountant and cashier. In business processes, the accountant is responsible for keeping accounts, while the cashier is in charge of making payments. By keeping these two functions divide, the company can prevent the accountant from misrepresenting accounts and embezzling corporate finances. Authorized documents frequently need to be stamped with two seals (i.e., the corporate seal and the legal representative’s seal), thus avoiding a staff member from abusing his position to issue fake documents, and these seals are normally delegated to two dissimilar people. These examples of the division of authority are designed to avoid a concentration of power which could raise operational risks this paper also proposes the HASBE scheme and operations of the same. An Enhanced HASBE for Cloud Computing Environment. This paper proposes advantages of the HASBE scheme and enhancement of the same. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments. In this paper, the survey started from basic attribute-based encryption scheme, followed by monotonic access structure which could be divided into key-policy attribute-based encryption scheme, cipher text-policy attribute-based encryption scheme. Attribute-based encryption scheme with non- monotonic structure is introduced. Thereafter, and hierarchical attribute-based encryption scheme as the end. GASBE: A Graded Attribute-Based Solution for Access Control in Cloud Computing This paper proposes the detailed system model of the HASBE scheme. System model consists of CSP, Data owner, Data consumer, Trusted Authority, Domain Authority. A Survey on Attribute Based Encryption Scheme in Cloud Computing. This paper proposes a method of encryption of a data based on the attributes of it.in this trusted authority, authorizes each user. The ABE proposes two more schemes i.e. KP-ABE and CP- ABE. III. IMPLEMENTATION A. System Architecture The system focuses on a proposed architecture Hierarchical Attribute Set Based Encryption (HASBE); which is derived from the Cipher Policy attribute-based encryption (CP-ABE) with a hierarchical data structure. This proposed approach not only achieves scalability, it achieves both flexibility and fine-grained access control of data in the cloud. Fig 1. System Architecture
  • 3. Shaikh Sadaf, Patil Dipti, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1455 In Fig. 1, the system consists of five form of parties: a cloud service provider, data owners, data consumers, a number of domain authorities, and a trusted root authority. The cloud service provider manages a cloud to supply data storage service. Data owners encrypt or encode their data files and store them in the cloud for sharing with data consumers. To access the shared data files, data consumers download encrypted data files of their interest from the cloud and then decrypt them. Each data owner/consumer is administrated by a domain authority. A domain authority is managed by its parent domain authority or the trusted authority. Data owners, data consumers, domain authorities, and the trusted authority are organized in a hierarchical manner. The proposed HASBE system expands the attribute based scheme to provide the hierarchical structure of the system. As our system model consists of a trusted authority, multiple domain authorities, and numerous data owners and consumers. [4] Fig 2. Format of Data on Cloud The trusted root authority is responsible for authorizing top level domain authorities. A domain authority is responsible for authorizing the next level domains or the users in its domain. Each user in the system is allocated a key structure which specifies the attributes associated with the user’s decryption key. Fig. 3.2 represents data file format of the cloud. A. ALGORITHMS USED BLOWFISH ALGORITHM It has total 16 rounds of encryption. Each round consists of key-dependent permutation and a key and data-dependent substitution. All the operations are XORed and the addition of 32 bit words. The only additional operations are four indexed array data lookup tables for each round. Initially, it divides the original message into 64 bit blocks and each 64 bit blocks are processed individually. Step1: Initially it divides the 64 bit block into two parts xL and xR of 32 bit each Step2: At first round, xL is XORed with the subkey p1 sub key and the result of XOR operation is given to Blowfish Function which again gets XORed with the xR. Step3: xL and xR both are swapped together. Step 4: the process continues to 16th round. Step 5: After the 16th round, xR is XORed with the p17 sub key and xL is XORed with the p18 sub key. Step 6: Result of both XOR opration is combined together to generate 64 bit ciphertext. Algorithm: Divide x into two 32-bit parts: xL, xR For i = 1 to 16 xL=XL XOR Pi xR=F(XL) XOR xR Swap XL and xR Swap XL and xR(undo the last swap) xR=xR XOR P17 xL=xL XOR P18 Recombine xL and xR
  • 4. Shaikh Sadaf, Patil Dipti, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1456 Fig 3. Blowfish Algorithm MAC FOR DATA INTEGRITY The MAC needed two inputs a message and a secret key known only to the originator of the message. The receiver of the message verifies the integrity of the message and authenticate that the message sender has the secret key. The Hash function is used to generate the MAC. The MAC is generated by calculating the hash value of the secret key and a message to be authenticated. The sender sends the message along with the calculated MAC value which will be encrypted with the secret key. At the receiver side receiver will decrypt the message with the secret key and again recalculate the MAC and compares it with the MAC value send by the sender. If the receiver’s calculated MAC and MAC which is sent by the sender is same then the message is authenticated and the data is verified. We have used Hash MAC (SHA) algorithm for calculating the Hash function. Definition: HMAC (M) =H [(K+opad) || H(K+ipad) || M] IV. PERFORMANCE ANALYSIS We analysed the system based on the time complexity that means the total time required to upload and download the file from the cloud. To measure the time complexity we have calculated the time required for files based on the size of the file. We have tested AES and DES Algorithms with our Blowfish algorithm and checked the total time required to AES algorithm, DES algorithm and total time required for encryption and decryption in Blowfish algorithm for various files. Based on above comparisons we have found that the Blowfish algorithm works better instead of AES and DES algorithm. Fig 4. Comparison of Algorithms
  • 5. Shaikh Sadaf, Patil Dipti, International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 1457 As per the analysis, we have tested we can say that the time required fir AES algorithm is more than the Blowfish algorithm. For every processed file it generates the new graph which shows the time required for both algorithm and comparison of both of them. CONCLUSIONS We proposed a scheme for providing scalable, efficient and flexible access control in cloud computing. The hierarchical nature of HASBE scheme provides more scalability than the previous ABE (Attribute Based Encryption) schemes. It not only supports the compound set of attributes due to flexible attribute set combinations but also achieves efficient user revocation. We proved that the security of proposed system HASBE is better than the security of CP-ABE and KP-ABE methods. Finally, we conducted the Result analysis and evaluation, which shows its efficiency and advantages over the existing system. In the proposed system, we also checked data integrity by using HMAC algorithm, which shows data stored on the cloud is safe and confidential. ACKNOWLEDGEMENT It is a great pleasure and moment of immense satisfaction for me to express my profound gratitude to my dissertation Project Guide, Prof. Dipti Patil whose constant encouragement enabled me to work enthusiastically. My heartfelt gratitude to the H.O.D of COMPUTER ENGINEERING Department Prof. Madumita Chatterjee and M.E coordinator Prof. Sharvari Govilkar who have always been there to help and give their time and advice in spite of their busy schedule. I am also thankful to Dr. R. I. K Moorthy, Principal, and Pillai college of Engineering, New Panvel, for his encouragement and for providing an outstanding academic environment, also for providing the adequate facilities. I acknowledge all the staff members of the department of Computer and Information Technology for their help and suggestions during various phases of this project work. REFERENCES 1. Minu George1, Dr. C. Suresh Gnanadhas2, Saranya.K3 “A Survey on Attribute Based Encryption Scheme in Cloud Computing” international Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 11, November 2013. 2. D. Hephzi Rachel1, S. Prathiba2 “An Enhanced HASBE for Cloud Computing Environment” A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013, pg 396-401. 3. Chandana V.R, Radhika Govankop, Rashmi N and R. Bharathi “GASBE: A GRADED ATTRIBUTE-BASED SOLUTION FOR ACCESS CONTROL IN CLOUD COMPUTING” International conference on Advances in Computer and Electrical Engineering (ICACEE 2012) Nov 17-18, 2012 Manila (Philippines). 4. 1S. Gokuldev, 2S.Leelavathi 1Associate Professor, 2PG Scholar 1,2Department of Computer Science and Engineering 1,2SNS College of Engineering, Coimbatore, India “HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control by Separate Encryption/Decryption in Cloud Computing” International Journal of Engineering science and innovative Technology, Volume 2, Issue 3, May 2013. 5. Cheng-Chi Lee1, Pei-Shan Chung2, and Min-Shiang Hwang3 “A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments” Department of Computer Science and Information Engineering, Asia Universtiy3 500 Liufeng Road, Wufeng, Taichung 402, Taiwan, R.O.C. International Journal of Network Security, Vol.15, No.4, PP.231-240, July 2013. 6. MANJEERA PATIL, 2A. SURESH BABU 1PGScholar, JNTU, Pulivendula, 2P.hd, Asso. Professor, JNTU, Pulivendula “HASBE: A HIERARCHICAL ATTRIBUTE-BASED SOLUTION FOR FLEXIBLE AND SCALABLE ACCESS CONTROL IN CLOUD COMPUTING” International journal of Electrical, Electronics and Computer system ISSN (online) 2347-2812, Volume - 1, Issue -3, 2013. 7. S. Dhivya bharathi1 S. Sathyalakshmi 2 “A Novel Method of HASBE with Improved Efficiency and Delegation Mechanism in Cloud” Proc. of the Intl. Conf. on Recent Trends In Computing and Communication Engineering -- RTCCE 2013 Copyright © Institute of Research Engineers and Doctors ISBN:978-981-07-6184-4-doi:10.3850/978-981-07-6184-4_16. 8. http://www.slideshare.net/IMPULSE_TECHNOLOGY/hasbe-a-hierarchical-attribute-basedsolution 9. http://www.youtube.com/watch?v=DnBF2rY6vX0/hasbe.html