SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 14
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Ramiz Shaikh1
Ankit Dongre2
1
Research Scholar 2
Associate Professor
1,2
Department of Computer Science & Engineering
1,2
Jawaharlal Institute of Technology Borawan, M.P, India
Abstract— Cloud security is the most critical task while
considering its working environment, i.e. outsourced,
distributed and utility based. In such cases making the users
data confidential, increases the trust over the system. Also
the security procedure does not make the availability
affected in any ways. The users of these kind of systems is
always retained the services and securities preliminaries
with respect to the data itself. As the cloud user can access
its data frequently and if here some encryption is used which
requires decryption and the repetitive process continues to
increase the overheads. It requires some mechanism in
which encryption is performed and if the user requires to
perform some operations on secure file without decrypting it
can be fulfilled. Thus homomorphic encryption lets the user
facilitates about the performing operations on encrypted data
which reduces the complexity of confidentiality operations.
Also to prevent Cloud Servers from being able to learn both
the data file contents and user access privilege information
used to generate key along with the fastest access of secured
data by using Attribute-based encryption (ABE).
Key words: Attribute Based Encryption, Cloud Storage,
Data Storage, Homomorephic
I. INTRODUCTION
In cloud environment all the data is outsourced for services
including storage and security. In such cases the users lost
control over its data and the dependency is generated over
the cloud provider or service provider. Thus, if the user is
equipped with some controls, then the user trust is also
increased and the total cloud control over the data is shifted
from third party to the user. So for applying the encryption
the user holds the key and not the cloud provider to increase
the protection over the cloud data. But for providers view
such keys are in consistence with their existing business
models. These models restrict the cloud provider’s
capability for information mine or otherwise exploit the
users' data. If a cloud provider doesn't have access to the
keys, they lose access to the information for his or her own
use. Whereas a cloud supplier could comply with keep the
information confidential (i.e., they will not show it to
anyone else) that promise doesn't stop their own use of the
information to enhance search results or deliver ads. Of
course, this sort of access to the information has vast worth
to some cloud suppliers and that they believe that data
access in exchange for providing below-cost cloud services
could be an honest trade.
Also, providing onsite cryptography at rest choices
would possibly need some suppliers to considerably modify
their existing software package systems that may need a
considerable capital investment. That second reason is
actually very important, too. A lot of cloud providers don't
just store client data; they do things with that data. If the
client encodes the information, it’s a murky blob to the
cloud supplier - and a ton of cloud administrations would be
unimaginable. Thus the problem is at both the end provider
and user. To resolve these issues some third party needs to
take the control over it whose primary function is to deal
with such security scenarios and monitors the activities of
both the user and provider. Hence the key generation is the
major component which shows the importance of key and its
control for enhancing the security.
A. Homomorphic Encryption (HE)
Homomorphic encryption schemes that allow simple
computations on encrypted data have been known for a long
time. It has three major components:
 KeyGen: This module will generate the key as per the
requirement of the encryption schemes like symmetric
or asymmetric algorithms. The generated key should
provide effective security against any type of key
based attacks. Mainly the key is default generated by
the algorithmic component which is known to the
provider. Thus some new mechanism needs to be
developed for further improvement in security.
 Encrypt: This module provides the wide range of
encryption solution for improved security with lesser
computational loads on the servers. The practical
applicability of homomorphic encryption provides the
flexibility in the selection of encryption algorithms
means it can be user depended or provider dependent.
 Decrypt: This can be considered as a major
functionality of the homomorphic encryption. It differs
from the traditional encryption standards where the
complete data is decrypted for reading. Here the user
encrypts the data by unique key and sends it to the
provider. Now the provider or some other user is
capable applying the mathematical operations on such
homomorphically encrypted ciphertext and then revert
the result in the same encrypted format to the user
without reducing the confidentiality of the data.
II. LITERATURE REVIEW
In this subsection, we review some closely related works,
including noninteractive verifiable computation, pairing
delegation and proxy reencryption. Noninteractive
Verifiable Computation: Noninteractive verifiable
computation [19], [20] enables a computationally weak
client to outsource the computation of a function to one or
more workers. The workers return the result of the function
evaluation as well as a noninteractive proof that the
computation of the function was carried out correctly. Since
these schemes [19], [20] deal with outsourcing of general
computation problems and preserve the privacy of input
data, they can be used to outsource decryption in ABE
systems. However, the schemes proposed in [19], [20] use
Gentry’s fully homomorphic encryption system [21] as a
building block, and thus the overhead in these schemes is
currently too large to be practical. Recently, Parno et al.
establish an important connection between verifiable
computation and ABE. They show how to construct a
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
(IJSRD/Vol. 3/Issue 10/2015/002)
All rights reserved by www.ijsrd.com 15
verifiable computation scheme with public delegation and
public verifiability from any ABE scheme and how to
construct a multifunction verifiable computation scheme
from the ABE scheme with outsourced decryption presented
in [12]. Goldwasser et al. propose a succinct functional
encryption scheme for general functions, and show that, by
replacing the ABE scheme used in with their succinct
functional encryption scheme, one can obtain a delegation
scheme with is both publicly verifiable and secret, in the
sense that the prover does not learn anything about the input
or output of the function being delegated
III. PROPOSED SYSTEM
For fast and effective encryption with lesser ciphertext size,
the approach uses, partial homomorphic encryption using
RSA cryptosystem. This system is capable of generating fast
response with less overhead.
Improved Cryptosystem Security using User
Generated Keys: Security is further increased by giving
some controls to the user for generating the keys through its
characteristics. This key is complex than some other
methods. By using this key with RSA cryptosystem, control
on data modifications and reading rights is provided to user
without its information and if the providers tries to leak the
data it is of no use without this user generated keys. This
attributes and characteristics do not match with some other
users and hence decoding the data is not possible.
It is clear that one of the most important goals of
the researches about the homomorphic encryption schemes
is to make them closer to practical applications. In this
section, we will discuss possible ways to achieve it. The
work evaluates a distributed security scheme for
effective encryption of dynamic data of users
A. Proposed Algorithm
1) User registers to Cloud Service Provider
2) Send user details (UID, Uname) to Third Party Auditor
3) TPA Authenticates user
4) User Logs in
5) Fetch values of Current Users Attributes (username,
ID, timestamp)
6) Generate key by Apply MD5 to Users Attributes
(username, ID, timestamp)
7) Convert the key to biginteger and make it final public
key
8) Apply Homomorphic (RSA) encryption to Data of
message M using key
9) Send Data of message M to CSP
10) Transferring Information (UserID, UserName, FromIP,
FileName, FileSize, Failed login attempts) in a Log file
stored at TPA
11) Download original message by passing the Private Key
IV. IMPLEMENTATION &RESULT
With help of OpenShift Red hat public cloud developed
application CP-ABE.Following step are used for create
application.
1) Register user details openshift public cloud and verify
through mail.
2) Create application in with following tools
 JBoss Developer Studio
 Mysql 5.0
 PHP MY Admin4.0
Fig. 1: Application Details on OpenShift
Figure 1 show application details of cloud which is
created by us. Functionality performs using language
JAVA/JSP/Servlet.
3) Application map with Eclipse IDE.
http://abe-accesscontrol.rhcloud.com/ url is used for
performing all the task which are related this application.
Results are measured and analyzed on above
factors and compared with traditional and other available
systems. Several tables and graphs are shown by which
effective comparison can be made on different views which
strongly confirms the applicability of suggested approach.
S. No UserID UserName
1 ramiz@gmail.com Ramiz
2 ramizsheikh@gmail.com Ramiz Sheikh
Table 4.1: User Credential on public cloud
Login form shows the signup and if already signed,
it provides the facility to enter id and password to sign in.
The user has to provide his email id and password to login
the account. The identity and password is been verified first
then the user will be able to access his account.
Table 4.2 show time complexities of different file
uploading and encryption using CP-ABE.
File Name File Size (KB)
Encryption Time
(in millisecond)
(CP-ABE)
Input1.txt 10 15.0
Input2.txt 300 84.0
Input3.txt 2000 274.0
Table 4.2: Time Complexities of CP-ABE for different Files
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
(IJSRD/Vol. 3/Issue 10/2015/002)
All rights reserved by www.ijsrd.com 16
Fig. 3: Graph of CP-ABE for different Files
V. CONCLUSION
Futuristic results of the technique may show the
improvement in providing the security with feasible
operations on cipher using partially homomorphic
cryptosystems and is most suitable for outsourced cloud
environment. This improved encryption is faster and less
computational overhead is involved. It provides the high end
reliability towards the new orientation of the system.
The third party mechanism deals with continuous
monitoring of user record. This monitoring along with
improved throughput and efficiency is achieved. Out of
these methods an enhanced secure scenarios is generated
through our proposed TPA-HE. At the initial level of our
research, we get the following benefits.
 Improved security solution with less operational
overheads and retains reliability on novel encryptions
 Unauthorized access is blocked using improved key
generation through user characteristics.
 Continuous monitoring gives the user behavior
measurements and analyzes the affection of such novel
cryptosystem on other services.
REFERENCES
[1] Shucheng Yu , “Achieving Secure, Scalable, and Fine-
grained Data Access Control in Cloud Computing”,
in Proceedings of IEEE Infocomm, ISSN: 978-1-4244-
5837-0/10, 2010.
[2] Srijith “Towards Secure Cloud Bursting,Brokerage and
Aggregation” 2010 Eighth IEEE European conference
on web services
[3] Cong Wang, Student Member, IEEE, Sherman S.-M.
Chow, Qian Wang, Student Member, IEEE,KuiRen,
Member, IEEE, and Wenjing Lou, Member, IEEE
“Privacy-Preserving Public Auditing for Secure Cloud
Storage, IEEE-2012
[4] Cong Wang1, Qian Wang1, Kui Ren1, and Wenjing
Lou2,” Privacy-Preserving Public Auditing for Data
Storage Security in Cloud Computing”, IEEE
INFOCOM 2010, San Diego, CA, March 2010
[5] Ms. Vaishnavi Moorthy1, Dr. S. Sivasubramaniam2,”
Implementing Remote Data Integrity Checking
Protocol for Secured Storage Services with Data
Dynamics and Public Verifiability In Cloud
Computing, IOSR Journal of EngineeringMar. 2012,
Vol. 2(3) pp: 496-500
[6] C. Hota, S. Sanka, M. Rajarajan, S. Nair, "Capability-
based Cryptographic Data Access Control in Cloud
Computing", in International Journal of Advanced
Networking and Applications, Volume 01, Issue 01,
2011.
[7] Rosario Gennaro and Daniel Wichs, Fully
Homomorphic Message Authenticators IBM Research,
T.J. Watson, May 23, 2012
[8] K. Kajendran, J. Jeyaseelan, J. Joshi, “An Approach
for secures Data storage using Cloud Computing” In
International Journal of Computer Trends and
Technology- May to June Issue 2011
[9] W. Luo, G. Bai, “Ensuring the Data Integrity In Cloud
computing” In Proceedings of IEEE CCIS, 2011.
[10] S. Sanka, C. Hota, and M. Rajarajan, “Secure data
access in cloud computing,” in 2010 IEEE 4th
International [13] http://en.wikipedia.org/wiki
[11] H. Shacham and B. Waters, “Compact proofs of
retrievability,” in Proc. of Asiacrypt 2008, vol. 5350,
Dec 2008, pp. 90–107.
[12] Dianli GUO and Fengtong WEN, “A More Secure
Dynamic ID Based Remote User Authentication
Scheme for Multi-server Environment”, in Journal of
Computational Information Systems, ISSN; 1553–
9105, Vol. 9:No. 2, 2013, 407-413
[13] Kristin Lauter, Michael Naehrig andVinod
Vaikuntanathan, “Can Homomorphic Encryption be
Practical”, in ACM, 2008.
[14] Craig Gentry, “Computing Arbitrary Functions of
Encrypted Data”, in ACM by IBM T.J. Watson
Research Center, 2008.
[15] Bharath K. Samanthula, Gerry Howser, Yousef
Elmehdwi, and Sanjay Madria, “An Efficient and
Secure Data Sharing Framework using Homomorphic
Encryption in the Cloud”, in Cloud 1st conference by
ACM, ISSN: 978-1-4503, DOI: 1596-8/12/08, 2012.
[16] Robert Griffin and Subhash Sankuratripati, “Key
Management Interoperability Protocol Profile Version
1.1”, in OASIS Standards Organizations at
http://docs.oasis-open.org/kmip/profiles/v1.1/os/kmip-
profiles-v1.1-os.doc, 2013.
[17] Web Article, “Amazon Web Services: Overview of
Security Processes” by Amazon Services at
http://aws.amazon.com/security,June 2013.
[18] K. Raen, C. Wang, Q. Wang, “Security Challenges for
the Public Cloud”, Published by IEEE Computer
Society, Jan/Feb 2012
[19] J.-P. Aumasson, L. Henzen, W. Meier, and R. Phan,
“SHA-3 proposal BLAKE,” December 2010.
[20] GALS System Design: Side Channel Attack Secure
Cryptographic Accelerators
[21] AES encryption and decryption
http://www.iis.ee.ethz.ch/~kgf/acacia/c3.html
[22] Kamara, S., Lauter, K.: “Cryptographic cloud storage”.
In: Proceedings of the 14th international conference on
financial cryptography and data security, FC'10, pp.
136-149. Springer-Verlag, Berlin, Heidelberg (2010)

More Related Content

What's hot

CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Shakas Technologies
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
IRJET Journal
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Shakas Technologies
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Pvrtechnologies Nellore
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
IRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
Venkat Projects
 
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
Nexgen Technology
 
An efficient certificate less encryption for
An efficient certificate less encryption forAn efficient certificate less encryption for
An efficient certificate less encryption for
Shakas Technologies
 
Ieee 2015 2016
Ieee 2015 2016Ieee 2015 2016
Ieee 2015 2016
Focuslogic Walaja
 
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATESENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
Nexgen Technology
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446
IJRAT
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attack
eSAT Publishing House
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
Pvrtechnologies Nellore
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 

What's hot (20)

CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
 
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
 
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
 
An efficient certificate less encryption for
An efficient certificate less encryption forAn efficient certificate less encryption for
An efficient certificate less encryption for
 
Ieee 2015 2016
Ieee 2015 2016Ieee 2015 2016
Ieee 2015 2016
 
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATESENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attack
 
Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...Public integrity auditing for shared dynamic cloud data with group user revoc...
Public integrity auditing for shared dynamic cloud data with group user revoc...
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 

Viewers also liked

Generic and efficient constructions of attribute based encryption with verifi...
Generic and efficient constructions of attribute based encryption with verifi...Generic and efficient constructions of attribute based encryption with verifi...
Generic and efficient constructions of attribute based encryption with verifi...
LeMeniz Infotech
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
Naveena N
 
Dbms presentation of Automatic Car parking System
Dbms presentation of Automatic Car parking SystemDbms presentation of Automatic Car parking System
Dbms presentation of Automatic Car parking System
sumi haque
 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryption
KaashivInfoTech Company
 
Automatic car parking system by Himanshu
Automatic car parking system by HimanshuAutomatic car parking system by Himanshu
Automatic car parking system by Himanshu
himanshu3070
 
automatic car parking investment
automatic car parking investmentautomatic car parking investment
automatic car parking investment
Mehmet Cetin
 
Automatic car parking system with and without password report
Automatic car parking system with and without password reportAutomatic car parking system with and without password report
Automatic car parking system with and without password report
SOHIL PATEL
 
AUTOMATIC CAR PARKING SYSTEM
AUTOMATIC CAR PARKING SYSTEMAUTOMATIC CAR PARKING SYSTEM
AUTOMATIC CAR PARKING SYSTEM
sowmya Sowmya
 

Viewers also liked (8)

Generic and efficient constructions of attribute based encryption with verifi...
Generic and efficient constructions of attribute based encryption with verifi...Generic and efficient constructions of attribute based encryption with verifi...
Generic and efficient constructions of attribute based encryption with verifi...
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
 
Dbms presentation of Automatic Car parking System
Dbms presentation of Automatic Car parking SystemDbms presentation of Automatic Car parking System
Dbms presentation of Automatic Car parking System
 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryption
 
Automatic car parking system by Himanshu
Automatic car parking system by HimanshuAutomatic car parking system by Himanshu
Automatic car parking system by Himanshu
 
automatic car parking investment
automatic car parking investmentautomatic car parking investment
automatic car parking investment
 
Automatic car parking system with and without password report
Automatic car parking system with and without password reportAutomatic car parking system with and without password report
Automatic car parking system with and without password report
 
AUTOMATIC CAR PARKING SYSTEM
AUTOMATIC CAR PARKING SYSTEMAUTOMATIC CAR PARKING SYSTEM
AUTOMATIC CAR PARKING SYSTEM
 

Similar to Attribute-Based Encryption for Access of Secured Data in Cloud Storage

IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
 
1784 1788
1784 17881784 1788
1784 1788
Editor IJARCET
 
1784 1788
1784 17881784 1788
1784 1788
Editor IJARCET
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
Balkees Shereek
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
IJNSA Journal
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
IJCERT JOURNAL
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
Kiran Girase
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
IJARIIE JOURNAL
 

Similar to Attribute-Based Encryption for Access of Secured Data in Cloud Storage (20)

IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 

More from IJSRD

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication
IJSRD
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
IJSRD
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
IJSRD
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
IJSRD
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
IJSRD
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
IJSRD
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
IJSRD
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
IJSRD
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
IJSRD
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural Networks
IJSRD
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion Mining
IJSRD
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
IJSRD
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
IJSRD
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online Reviews
IJSRD
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
IJSRD
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
IJSRD
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
IJSRD
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
IJSRD
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
IJSRD
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
IJSRD
 

More from IJSRD (20)

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural Networks
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion Mining
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online Reviews
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 

Recently uploaded

Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 

Recently uploaded (20)

Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 

Attribute-Based Encryption for Access of Secured Data in Cloud Storage

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 14 Attribute-Based Encryption for Access of Secured Data in Cloud Storage Ramiz Shaikh1 Ankit Dongre2 1 Research Scholar 2 Associate Professor 1,2 Department of Computer Science & Engineering 1,2 Jawaharlal Institute of Technology Borawan, M.P, India Abstract— Cloud security is the most critical task while considering its working environment, i.e. outsourced, distributed and utility based. In such cases making the users data confidential, increases the trust over the system. Also the security procedure does not make the availability affected in any ways. The users of these kind of systems is always retained the services and securities preliminaries with respect to the data itself. As the cloud user can access its data frequently and if here some encryption is used which requires decryption and the repetitive process continues to increase the overheads. It requires some mechanism in which encryption is performed and if the user requires to perform some operations on secure file without decrypting it can be fulfilled. Thus homomorphic encryption lets the user facilitates about the performing operations on encrypted data which reduces the complexity of confidentiality operations. Also to prevent Cloud Servers from being able to learn both the data file contents and user access privilege information used to generate key along with the fastest access of secured data by using Attribute-based encryption (ABE). Key words: Attribute Based Encryption, Cloud Storage, Data Storage, Homomorephic I. INTRODUCTION In cloud environment all the data is outsourced for services including storage and security. In such cases the users lost control over its data and the dependency is generated over the cloud provider or service provider. Thus, if the user is equipped with some controls, then the user trust is also increased and the total cloud control over the data is shifted from third party to the user. So for applying the encryption the user holds the key and not the cloud provider to increase the protection over the cloud data. But for providers view such keys are in consistence with their existing business models. These models restrict the cloud provider’s capability for information mine or otherwise exploit the users' data. If a cloud provider doesn't have access to the keys, they lose access to the information for his or her own use. Whereas a cloud supplier could comply with keep the information confidential (i.e., they will not show it to anyone else) that promise doesn't stop their own use of the information to enhance search results or deliver ads. Of course, this sort of access to the information has vast worth to some cloud suppliers and that they believe that data access in exchange for providing below-cost cloud services could be an honest trade. Also, providing onsite cryptography at rest choices would possibly need some suppliers to considerably modify their existing software package systems that may need a considerable capital investment. That second reason is actually very important, too. A lot of cloud providers don't just store client data; they do things with that data. If the client encodes the information, it’s a murky blob to the cloud supplier - and a ton of cloud administrations would be unimaginable. Thus the problem is at both the end provider and user. To resolve these issues some third party needs to take the control over it whose primary function is to deal with such security scenarios and monitors the activities of both the user and provider. Hence the key generation is the major component which shows the importance of key and its control for enhancing the security. A. Homomorphic Encryption (HE) Homomorphic encryption schemes that allow simple computations on encrypted data have been known for a long time. It has three major components:  KeyGen: This module will generate the key as per the requirement of the encryption schemes like symmetric or asymmetric algorithms. The generated key should provide effective security against any type of key based attacks. Mainly the key is default generated by the algorithmic component which is known to the provider. Thus some new mechanism needs to be developed for further improvement in security.  Encrypt: This module provides the wide range of encryption solution for improved security with lesser computational loads on the servers. The practical applicability of homomorphic encryption provides the flexibility in the selection of encryption algorithms means it can be user depended or provider dependent.  Decrypt: This can be considered as a major functionality of the homomorphic encryption. It differs from the traditional encryption standards where the complete data is decrypted for reading. Here the user encrypts the data by unique key and sends it to the provider. Now the provider or some other user is capable applying the mathematical operations on such homomorphically encrypted ciphertext and then revert the result in the same encrypted format to the user without reducing the confidentiality of the data. II. LITERATURE REVIEW In this subsection, we review some closely related works, including noninteractive verifiable computation, pairing delegation and proxy reencryption. Noninteractive Verifiable Computation: Noninteractive verifiable computation [19], [20] enables a computationally weak client to outsource the computation of a function to one or more workers. The workers return the result of the function evaluation as well as a noninteractive proof that the computation of the function was carried out correctly. Since these schemes [19], [20] deal with outsourcing of general computation problems and preserve the privacy of input data, they can be used to outsource decryption in ABE systems. However, the schemes proposed in [19], [20] use Gentry’s fully homomorphic encryption system [21] as a building block, and thus the overhead in these schemes is currently too large to be practical. Recently, Parno et al. establish an important connection between verifiable computation and ABE. They show how to construct a
  • 2. Attribute-Based Encryption for Access of Secured Data in Cloud Storage (IJSRD/Vol. 3/Issue 10/2015/002) All rights reserved by www.ijsrd.com 15 verifiable computation scheme with public delegation and public verifiability from any ABE scheme and how to construct a multifunction verifiable computation scheme from the ABE scheme with outsourced decryption presented in [12]. Goldwasser et al. propose a succinct functional encryption scheme for general functions, and show that, by replacing the ABE scheme used in with their succinct functional encryption scheme, one can obtain a delegation scheme with is both publicly verifiable and secret, in the sense that the prover does not learn anything about the input or output of the function being delegated III. PROPOSED SYSTEM For fast and effective encryption with lesser ciphertext size, the approach uses, partial homomorphic encryption using RSA cryptosystem. This system is capable of generating fast response with less overhead. Improved Cryptosystem Security using User Generated Keys: Security is further increased by giving some controls to the user for generating the keys through its characteristics. This key is complex than some other methods. By using this key with RSA cryptosystem, control on data modifications and reading rights is provided to user without its information and if the providers tries to leak the data it is of no use without this user generated keys. This attributes and characteristics do not match with some other users and hence decoding the data is not possible. It is clear that one of the most important goals of the researches about the homomorphic encryption schemes is to make them closer to practical applications. In this section, we will discuss possible ways to achieve it. The work evaluates a distributed security scheme for effective encryption of dynamic data of users A. Proposed Algorithm 1) User registers to Cloud Service Provider 2) Send user details (UID, Uname) to Third Party Auditor 3) TPA Authenticates user 4) User Logs in 5) Fetch values of Current Users Attributes (username, ID, timestamp) 6) Generate key by Apply MD5 to Users Attributes (username, ID, timestamp) 7) Convert the key to biginteger and make it final public key 8) Apply Homomorphic (RSA) encryption to Data of message M using key 9) Send Data of message M to CSP 10) Transferring Information (UserID, UserName, FromIP, FileName, FileSize, Failed login attempts) in a Log file stored at TPA 11) Download original message by passing the Private Key IV. IMPLEMENTATION &RESULT With help of OpenShift Red hat public cloud developed application CP-ABE.Following step are used for create application. 1) Register user details openshift public cloud and verify through mail. 2) Create application in with following tools  JBoss Developer Studio  Mysql 5.0  PHP MY Admin4.0 Fig. 1: Application Details on OpenShift Figure 1 show application details of cloud which is created by us. Functionality performs using language JAVA/JSP/Servlet. 3) Application map with Eclipse IDE. http://abe-accesscontrol.rhcloud.com/ url is used for performing all the task which are related this application. Results are measured and analyzed on above factors and compared with traditional and other available systems. Several tables and graphs are shown by which effective comparison can be made on different views which strongly confirms the applicability of suggested approach. S. No UserID UserName 1 ramiz@gmail.com Ramiz 2 ramizsheikh@gmail.com Ramiz Sheikh Table 4.1: User Credential on public cloud Login form shows the signup and if already signed, it provides the facility to enter id and password to sign in. The user has to provide his email id and password to login the account. The identity and password is been verified first then the user will be able to access his account. Table 4.2 show time complexities of different file uploading and encryption using CP-ABE. File Name File Size (KB) Encryption Time (in millisecond) (CP-ABE) Input1.txt 10 15.0 Input2.txt 300 84.0 Input3.txt 2000 274.0 Table 4.2: Time Complexities of CP-ABE for different Files
  • 3. Attribute-Based Encryption for Access of Secured Data in Cloud Storage (IJSRD/Vol. 3/Issue 10/2015/002) All rights reserved by www.ijsrd.com 16 Fig. 3: Graph of CP-ABE for different Files V. CONCLUSION Futuristic results of the technique may show the improvement in providing the security with feasible operations on cipher using partially homomorphic cryptosystems and is most suitable for outsourced cloud environment. This improved encryption is faster and less computational overhead is involved. It provides the high end reliability towards the new orientation of the system. The third party mechanism deals with continuous monitoring of user record. This monitoring along with improved throughput and efficiency is achieved. Out of these methods an enhanced secure scenarios is generated through our proposed TPA-HE. At the initial level of our research, we get the following benefits.  Improved security solution with less operational overheads and retains reliability on novel encryptions  Unauthorized access is blocked using improved key generation through user characteristics.  Continuous monitoring gives the user behavior measurements and analyzes the affection of such novel cryptosystem on other services. REFERENCES [1] Shucheng Yu , “Achieving Secure, Scalable, and Fine- grained Data Access Control in Cloud Computing”, in Proceedings of IEEE Infocomm, ISSN: 978-1-4244- 5837-0/10, 2010. [2] Srijith “Towards Secure Cloud Bursting,Brokerage and Aggregation” 2010 Eighth IEEE European conference on web services [3] Cong Wang, Student Member, IEEE, Sherman S.-M. Chow, Qian Wang, Student Member, IEEE,KuiRen, Member, IEEE, and Wenjing Lou, Member, IEEE “Privacy-Preserving Public Auditing for Secure Cloud Storage, IEEE-2012 [4] Cong Wang1, Qian Wang1, Kui Ren1, and Wenjing Lou2,” Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, IEEE INFOCOM 2010, San Diego, CA, March 2010 [5] Ms. Vaishnavi Moorthy1, Dr. S. Sivasubramaniam2,” Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing, IOSR Journal of EngineeringMar. 2012, Vol. 2(3) pp: 496-500 [6] C. Hota, S. Sanka, M. Rajarajan, S. Nair, "Capability- based Cryptographic Data Access Control in Cloud Computing", in International Journal of Advanced Networking and Applications, Volume 01, Issue 01, 2011. [7] Rosario Gennaro and Daniel Wichs, Fully Homomorphic Message Authenticators IBM Research, T.J. Watson, May 23, 2012 [8] K. Kajendran, J. Jeyaseelan, J. Joshi, “An Approach for secures Data storage using Cloud Computing” In International Journal of Computer Trends and Technology- May to June Issue 2011 [9] W. Luo, G. Bai, “Ensuring the Data Integrity In Cloud computing” In Proceedings of IEEE CCIS, 2011. [10] S. Sanka, C. Hota, and M. Rajarajan, “Secure data access in cloud computing,” in 2010 IEEE 4th International [13] http://en.wikipedia.org/wiki [11] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp. 90–107. [12] Dianli GUO and Fengtong WEN, “A More Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment”, in Journal of Computational Information Systems, ISSN; 1553– 9105, Vol. 9:No. 2, 2013, 407-413 [13] Kristin Lauter, Michael Naehrig andVinod Vaikuntanathan, “Can Homomorphic Encryption be Practical”, in ACM, 2008. [14] Craig Gentry, “Computing Arbitrary Functions of Encrypted Data”, in ACM by IBM T.J. Watson Research Center, 2008. [15] Bharath K. Samanthula, Gerry Howser, Yousef Elmehdwi, and Sanjay Madria, “An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud”, in Cloud 1st conference by ACM, ISSN: 978-1-4503, DOI: 1596-8/12/08, 2012. [16] Robert Griffin and Subhash Sankuratripati, “Key Management Interoperability Protocol Profile Version 1.1”, in OASIS Standards Organizations at http://docs.oasis-open.org/kmip/profiles/v1.1/os/kmip- profiles-v1.1-os.doc, 2013. [17] Web Article, “Amazon Web Services: Overview of Security Processes” by Amazon Services at http://aws.amazon.com/security,June 2013. [18] K. Raen, C. Wang, Q. Wang, “Security Challenges for the Public Cloud”, Published by IEEE Computer Society, Jan/Feb 2012 [19] J.-P. Aumasson, L. Henzen, W. Meier, and R. Phan, “SHA-3 proposal BLAKE,” December 2010. [20] GALS System Design: Side Channel Attack Secure Cryptographic Accelerators [21] AES encryption and decryption http://www.iis.ee.ethz.ch/~kgf/acacia/c3.html [22] Kamara, S., Lauter, K.: “Cryptographic cloud storage”. In: Proceedings of the 14th international conference on financial cryptography and data security, FC'10, pp. 136-149. Springer-Verlag, Berlin, Heidelberg (2010)