Cloud Computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge
and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud
computing the most important matter of concern are data security and privacy along with flexibility, scalability and fine grained access
control of data being the other requirements to be maintained by cloud systems Access control is one of the prominent research topics
and hence various schemes have been proposed and implemented. But most of them do not provide flexibility, scalability and fine
grained access control of the data on the cloud. In order to address the issues of flexibility, scalability and fine grained access control
of remotely stored data on cloud we have proposed the hierarchical attribute set-based encryption (HASBE) which is the extension of
attribute- set-based encryption(ASBE) with a hierarchical structure of users. The proposed scheme achieves scalability by handling the
authority to appropriate entity in the hierarchical structure, inherits flexibility by allowing easy transfer and access to the data in case
of location switch. It provides fine grained access control of data by showing only the requested and authorized details to the user thus
improving the performance of the system. In addition, it provides efficient user revocation within expiration time, request to view
extra-attributes and privacy in the intra-level hierarchy is achieved. Thus the scheme is implemented to show that is efficient in access
control of data as well as security of data stored on cloud with comprehensive experiments
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...IJERA Editor
Enterprise level cloud data storage is gaining importance in the area of consumer level file hostage services. Cloud storage providers are responsible for availability, accessibility and protection of the user data. A number of encrypting schemes have been proposed for encrypting the user data in cloud storage to protect unauthorized access. Most of the Attribute Based Encryption (ABE) schemes that were proposed assume that the data in cloud storage are secure and are never disclosed. However, in reality, some of the authorities may force the cloud storage providers to disclose the cloud user’s secrets or personal data. In this paper, a new deniable ABE encryption scheme for cloud storage is proposed to ensure user privacy with minimized unauthorized access. A new ranking algorithm assigns a rank to each user at the time of registration based on their personal information. The rank of the user enhances the privacy and provides access control to the data stored on cloud. Each file uploaded to cloud is assigned with a rank and the file downloads only if the rank of the user matches the rank associated with the file. If rank of the user does not match then a fake file will be downloaded. Since authorities who demand for user secret cannot decide if the information they get about the user are legitimate, the cloud storage providers make sure that the individual user privacy is still protected. The ranking algorithm is also used to provide improved cloud access response time to prioritized users
Attribute Based Encryption with Attribute Hiding in Cloud StorageIJTET Journal
Abstract— Cloud computing is widely used technologies that provides on-demand self services. One of the main services is cloud storage. Cloud storage is used to store up and access the data anywhere from the cloud. To have a have power over the data we necessitate a fine-grained access control system. One of the Fine-grained access control system is Attribute Based Encryption (ABE). The ABE system is used to provide access control using attributes. Attributes may be anything. For example, it may person‟s roles or date. In ABE system the encryption phase consists of access rules. Rules are depended on the data owner and the consumer. It is not hidden in the existing systems. Through this, users can get the useful information from access rules without decryption. To improve the effectiveness of the ABE system, a new ABE algorithm is proposed. The proposed ABE algorithm has the features hiding Attributes and Access Policies. Through this, users getting useful information from the cipher text are avoided. Attributes and Access policies are hidden by the hash function and polynomial functions. The proposed ABE system ensures data privacy and policy privacy. Through this, the efficiency of the attribute based encryption system is improved.
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...IJERA Editor
Enterprise level cloud data storage is gaining importance in the area of consumer level file hostage services. Cloud storage providers are responsible for availability, accessibility and protection of the user data. A number of encrypting schemes have been proposed for encrypting the user data in cloud storage to protect unauthorized access. Most of the Attribute Based Encryption (ABE) schemes that were proposed assume that the data in cloud storage are secure and are never disclosed. However, in reality, some of the authorities may force the cloud storage providers to disclose the cloud user’s secrets or personal data. In this paper, a new deniable ABE encryption scheme for cloud storage is proposed to ensure user privacy with minimized unauthorized access. A new ranking algorithm assigns a rank to each user at the time of registration based on their personal information. The rank of the user enhances the privacy and provides access control to the data stored on cloud. Each file uploaded to cloud is assigned with a rank and the file downloads only if the rank of the user matches the rank associated with the file. If rank of the user does not match then a fake file will be downloaded. Since authorities who demand for user secret cannot decide if the information they get about the user are legitimate, the cloud storage providers make sure that the individual user privacy is still protected. The ranking algorithm is also used to provide improved cloud access response time to prioritized users
Attribute Based Encryption with Attribute Hiding in Cloud StorageIJTET Journal
Abstract— Cloud computing is widely used technologies that provides on-demand self services. One of the main services is cloud storage. Cloud storage is used to store up and access the data anywhere from the cloud. To have a have power over the data we necessitate a fine-grained access control system. One of the Fine-grained access control system is Attribute Based Encryption (ABE). The ABE system is used to provide access control using attributes. Attributes may be anything. For example, it may person‟s roles or date. In ABE system the encryption phase consists of access rules. Rules are depended on the data owner and the consumer. It is not hidden in the existing systems. Through this, users can get the useful information from access rules without decryption. To improve the effectiveness of the ABE system, a new ABE algorithm is proposed. The proposed ABE algorithm has the features hiding Attributes and Access Policies. Through this, users getting useful information from the cipher text are avoided. Attributes and Access policies are hidden by the hash function and polynomial functions. The proposed ABE system ensures data privacy and policy privacy. Through this, the efficiency of the attribute based encryption system is improved.
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
Abstract Cloud computing technology is widely used so that the data can be outsourced on cloud can accessed easily. Different members can share that data through different virtual machines but present on single physical machine. But the thing is user don’t have physical control over the outsourced data. The need is to share data securely among users. The cloud service provider and users authentication is necessary to make sure no loss or leak of users data. Privacy preserving in cloud is important make sure the users identity is not revealed to everyone. On cloud anyone can share data as much they want to i.e. only selected content can be shared. Cryptography helps the data owner to share the data to in safe way. So user encrypts data and uploads on server. Different encryption and decryption keys are generated for different data. The encryption and decryption keys may be different for different set of data. Only those set of decryption keys are shared that the selected data can be decrypted. Here a public-key cryptosystems which generate a ciphertext which is of constant size. So that to transfer the decryption rules for number of ciphertext. The difference is one can collect a set of secret keys and make them as small size as a single key with holding the same ability of all the keys that are formed in a group. This compact aggregate key can be efficiently sent to others or to be stored in a smart card with little secure storage. Keywords: Cloud storage, Attribute base encryption, Identity base encryption, Cloud storage, data sharing, key-aggregate encryption
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
Abstract Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and confidential data over the cloud. As the data is transferred among the server and client, the data is to be protected from unauthorized entries into the server, by authenticating the user’s and provide high secure priority to the data. So the Experts always recommend using different passwords for different logins. Any normal person cannot possibly follow that advice and memorize all their usernames and passwords. That is where password managers come in. The purpose of this paper is to secure data from unauthorized person using Security blanket algorithm.
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Cloud computing is an emerging computing technology that enables users to distantly store their data into a cloud so as to enjoy scalable services when required. And user can outsource their resources to server (also called cloud) using Internet. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Attribute-based encryption (ABE) can be used for log encryption. This survey is more specific to the different security issues on data access in cloud environment.
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
Cloud computing refers to a type of networked computing whereby an application can be run on connected
servers instead of local servers. Cloud can be used to store data, share resources and also to provide
services. Technically, there is very little difference between public and private cloud architecture. However,
the security and privacy of the data is a very big issue when sensitive data is being entrusted to third party
cloud service providers. Thus encryption with a fine grained access control is inevitable to enforce security
in clouds. Several techniques implementing attribute based encryption for fine grained access control have
been proposed. Under such approaches, the key management overhead is a little bit high in terms of
computational complexity. Also, secret sharing mechanisms have added complexity. Moreover, they lack
mechanisms to handle existence of traitors. Our proposed approach addresses these requirements and
reduces the overhead of the key management as well as secret sharing by using efficient algorithms and
protocols. Also, a traitor tracing technique is introduced into the cloud computing two layer encryption
environment.
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
The advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to commercial public cloud for great flexibility and
economic savings. But for protecting data privacy, sensitive data has to be encrypted before
outsourcing.Considering the large number of data users and documents in cloud, it is crucial for
the search service to allow multi-keyword query and provide result similarity ranking to meet the
effective data retrieval need. Related works on searchable encryption focus on single keyword
search or Boolean keyword search, and rarely differentiate the search results. We first propose a
basic MRSE scheme using secure inner product computation, and then significantly improve it to
meet different privacy requirements in two levels of threat models. The Incremental High Utility
Pattern Transaction Frequency Tree (IHUPTF-Tree) is designed according to the transaction
frequency (descending order) of items to obtain a compact tree.
By using high utility pattern the items can be arranged in an efficient manner. Tree structure
is used to sort the items. Thus the items are sorted and frequent pattern is obtained. The frequent
pattern items are retrieved from the database by using hybrid tree (H-Tree) structure. So the
execution time becomes faster. Finally, the frequent pattern item that satisfies the threshold value
is displayed.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...ijsrd.com
Cloud computing have high demand due to waste and huge data usage of clients. The privacy and security become major concern on the outsourced cloud data storage. The attribute based encryption schemes are used recently for access control of outsourced cloud data. It has highly inflexible in implementing complex access control policies. The existing work presented Hierarchical attribute set based Encryption (HASBE) that extended cipher-text policy attribute set based encryption (ASBE) with hierarchical structure of users. It used achieve scalability, inherits flexibility, fine grained access control, and employs multiple value assignments for access expiration time, and deal with user revocation efficiently. The performance analysis is made to evaluate the computational complexity of access control for outsourced data in cloud computing. However varying of cloud service provider complicates the hierarchical access control policies. The proposal presented an Adaptive Delegation Authority model enhancement to HASBE. It is used to minimize the complexity of access control policies in changing cloud service provider. The delegation authority coordinates the data owners and consumer for easy and quick data access control. It intimates the data owners and consumers about the authority delegation. The delegation authority sends encryption standards to be followed thereafter. The simulation is carried with Cloud simulator using java to testify in the effectiveness of Adaptive Delegation Authority enhancement to HASBE.
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
Cloud computing refers to a type of networked computing whereby an application can be run on connected servers instead of local servers. Cloud can be used to store data, share resources and also to provide services. Technically, there is very little difference between public and private cloud architecture. However, the security and privacy of the data is a very big issue when sensitive data is being entrusted to third party cloud service providers. Thus encryption with a fine grained access control is inevitable to enforce security in clouds. Several techniques implementing attribute based encryption for fine grained access control have been proposed. Under such approaches, the key management overhead is a little bit high in terms of computational complexity. Also, secret sharing mechanisms have added complexity. Moreover, they lack mechanisms to handle existence of traitors. Our proposed approach addresses these requirements and reduces the overhead of the key management as well as secret sharing by using efficient algorithms and protocols. Also, a traitor tracing technique is introduced into the cloud computing two layer encryption environment.
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
Cloud environment supports data sharing between multiple users. Data integrity is violated
due to hardware / software failures and human errors. Data owners and public verifiers are involved to
efficiently audit cloud data integrity without retrieving the entire data from the cloud server. File and
block signatures are used in the integrity verification process.
“One Ring to RUle Them All” (Oruta) scheme is used for privacy-preserving public auditing process. In
oruta homomorphic authenticators are constructed using Ring Signatures. Ring signatures are used to
compute verification metadata needed to audit the correctness of shared data. The identity of the signer
on each block in shared data is kept private from public verifiers. Homomorphic authenticable ring
signature (HARS) scheme is applied to provide identity privacy with blockless verification. Batch
auditing mechanism supports to perform multiple auditing tasks simultaneously. Oruta is compatible
with random masking to preserve data privacy from public verifiers. Dynamic data management process
is handled with index hash tables. Traceability is not supported in oruta scheme. Data dynamism
sequence is not managed by the system. The system obtains high computational overhead
The proposed system is designed to perform public data verification with privacy. Traceability features
are provided with identity privacy. Group manager or data owner can be allowed to reveal the identity of
the signer based on verification metadata. Data version management mechanism is integrated with the
system.
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...eSAT Journals
Abstract Cloud computing technology is widely used so that the data can be outsourced on cloud can accessed easily. Different members can share that data through different virtual machines but present on single physical machine. But the thing is user don’t have physical control over the outsourced data. The need is to share data securely among users. The cloud service provider and users authentication is necessary to make sure no loss or leak of users data. Privacy preserving in cloud is important make sure the users identity is not revealed to everyone. On cloud anyone can share data as much they want to i.e. only selected content can be shared. Cryptography helps the data owner to share the data to in safe way. So user encrypts data and uploads on server. Different encryption and decryption keys are generated for different data. The encryption and decryption keys may be different for different set of data. Only those set of decryption keys are shared that the selected data can be decrypted. Here a public-key cryptosystems which generate a ciphertext which is of constant size. So that to transfer the decryption rules for number of ciphertext. The difference is one can collect a set of secret keys and make them as small size as a single key with holding the same ability of all the keys that are formed in a group. This compact aggregate key can be efficiently sent to others or to be stored in a smart card with little secure storage. Keywords: Cloud storage, Attribute base encryption, Identity base encryption, Cloud storage, data sharing, key-aggregate encryption
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
Abstract Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and confidential data over the cloud. As the data is transferred among the server and client, the data is to be protected from unauthorized entries into the server, by authenticating the user’s and provide high secure priority to the data. So the Experts always recommend using different passwords for different logins. Any normal person cannot possibly follow that advice and memorize all their usernames and passwords. That is where password managers come in. The purpose of this paper is to secure data from unauthorized person using Security blanket algorithm.
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Cloud computing is an emerging computing technology that enables users to distantly store their data into a cloud so as to enjoy scalable services when required. And user can outsource their resources to server (also called cloud) using Internet. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Attribute-based encryption (ABE) can be used for log encryption. This survey is more specific to the different security issues on data access in cloud environment.
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
Cloud computing refers to a type of networked computing whereby an application can be run on connected
servers instead of local servers. Cloud can be used to store data, share resources and also to provide
services. Technically, there is very little difference between public and private cloud architecture. However,
the security and privacy of the data is a very big issue when sensitive data is being entrusted to third party
cloud service providers. Thus encryption with a fine grained access control is inevitable to enforce security
in clouds. Several techniques implementing attribute based encryption for fine grained access control have
been proposed. Under such approaches, the key management overhead is a little bit high in terms of
computational complexity. Also, secret sharing mechanisms have added complexity. Moreover, they lack
mechanisms to handle existence of traitors. Our proposed approach addresses these requirements and
reduces the overhead of the key management as well as secret sharing by using efficient algorithms and
protocols. Also, a traitor tracing technique is introduced into the cloud computing two layer encryption
environment.
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
The advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to commercial public cloud for great flexibility and
economic savings. But for protecting data privacy, sensitive data has to be encrypted before
outsourcing.Considering the large number of data users and documents in cloud, it is crucial for
the search service to allow multi-keyword query and provide result similarity ranking to meet the
effective data retrieval need. Related works on searchable encryption focus on single keyword
search or Boolean keyword search, and rarely differentiate the search results. We first propose a
basic MRSE scheme using secure inner product computation, and then significantly improve it to
meet different privacy requirements in two levels of threat models. The Incremental High Utility
Pattern Transaction Frequency Tree (IHUPTF-Tree) is designed according to the transaction
frequency (descending order) of items to obtain a compact tree.
By using high utility pattern the items can be arranged in an efficient manner. Tree structure
is used to sort the items. Thus the items are sorted and frequent pattern is obtained. The frequent
pattern items are retrieved from the database by using hybrid tree (H-Tree) structure. So the
execution time becomes faster. Finally, the frequent pattern item that satisfies the threshold value
is displayed.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...ijsrd.com
Cloud computing have high demand due to waste and huge data usage of clients. The privacy and security become major concern on the outsourced cloud data storage. The attribute based encryption schemes are used recently for access control of outsourced cloud data. It has highly inflexible in implementing complex access control policies. The existing work presented Hierarchical attribute set based Encryption (HASBE) that extended cipher-text policy attribute set based encryption (ASBE) with hierarchical structure of users. It used achieve scalability, inherits flexibility, fine grained access control, and employs multiple value assignments for access expiration time, and deal with user revocation efficiently. The performance analysis is made to evaluate the computational complexity of access control for outsourced data in cloud computing. However varying of cloud service provider complicates the hierarchical access control policies. The proposal presented an Adaptive Delegation Authority model enhancement to HASBE. It is used to minimize the complexity of access control policies in changing cloud service provider. The delegation authority coordinates the data owners and consumer for easy and quick data access control. It intimates the data owners and consumers about the authority delegation. The delegation authority sends encryption standards to be followed thereafter. The simulation is carried with Cloud simulator using java to testify in the effectiveness of Adaptive Delegation Authority enhancement to HASBE.
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
Cloud computing refers to a type of networked computing whereby an application can be run on connected servers instead of local servers. Cloud can be used to store data, share resources and also to provide services. Technically, there is very little difference between public and private cloud architecture. However, the security and privacy of the data is a very big issue when sensitive data is being entrusted to third party cloud service providers. Thus encryption with a fine grained access control is inevitable to enforce security in clouds. Several techniques implementing attribute based encryption for fine grained access control have been proposed. Under such approaches, the key management overhead is a little bit high in terms of computational complexity. Also, secret sharing mechanisms have added complexity. Moreover, they lack mechanisms to handle existence of traitors. Our proposed approach addresses these requirements and reduces the overhead of the key management as well as secret sharing by using efficient algorithms and protocols. Also, a traitor tracing technique is introduced into the cloud computing two layer encryption environment.
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
Cloud environment supports data sharing between multiple users. Data integrity is violated
due to hardware / software failures and human errors. Data owners and public verifiers are involved to
efficiently audit cloud data integrity without retrieving the entire data from the cloud server. File and
block signatures are used in the integrity verification process.
“One Ring to RUle Them All” (Oruta) scheme is used for privacy-preserving public auditing process. In
oruta homomorphic authenticators are constructed using Ring Signatures. Ring signatures are used to
compute verification metadata needed to audit the correctness of shared data. The identity of the signer
on each block in shared data is kept private from public verifiers. Homomorphic authenticable ring
signature (HARS) scheme is applied to provide identity privacy with blockless verification. Batch
auditing mechanism supports to perform multiple auditing tasks simultaneously. Oruta is compatible
with random masking to preserve data privacy from public verifiers. Dynamic data management process
is handled with index hash tables. Traceability is not supported in oruta scheme. Data dynamism
sequence is not managed by the system. The system obtains high computational overhead
The proposed system is designed to perform public data verification with privacy. Traceability features
are provided with identity privacy. Group manager or data owner can be allowed to reveal the identity of
the signer based on verification metadata. Data version management mechanism is integrated with the
system.
A Secure & Scalable Access Method in Cloud Computingijsrd.com
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack, The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility. We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
Cloud computing is an innovative idea for IT industries which provides several services to
users. In cloud computing secure authentication and data integrity of data is a major challenge, due to
internal and external threats. For improvement in data security over cloud, various techniques are
used.MAC based authentication is one of them, which suffers from undesirable systematic demerits
which have bounded usage and not secure verification, which may pose additional online load to users,
in a public auditing setting. Reliable and secure auditing are also challenging in cloud. In Cloud auditing
existing audit systems are based on aggregate key HLA algorithm. This algorithm is based on variable
sizes, different aggregate key generation, which encounters with security issues at decryption level.
Current Scheme generates a high length of key decryption that encounters with problem of space
complexity. To overcome these issues, We can improve HLA algorithm by improve aggregate key
generation, based on fixed key size. This algorithm generates constant aggregate key which will
overcomes problem of sharing of keys, security issues and space complexity.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
Attribute-based Encryption is observed as a promising cryptographic leading tool to assurance data owners’ direct
regulator over their data in public cloud storage. The former ABE schemes include only one authority to maintain the whole
attribute set, which can carry a single-point bottleneck on both security and performance. Then, certain multi-authority
schemes are planned, in which numerous authorities distinctly maintain split attribute subsets. However, the single-point
bottleneck problem remains unsolved. In this survey paper, from another perspective, we conduct a threshold multi-authority
CP-ABE access control scheme for public cloud storage, named TMACS, in which multiple authorities jointly manage a
uniform attribute set. In TMACS, taking advantage of (t, n) threshold secret allocation, the master key can be shared among
multiple authorities, and a lawful user can generate his/her secret key by interacting with any t authorities. Security and
performance analysis results show that TMACS is not only verifiable secure when less than t authorities are compromised, but
also robust when no less than t authorities are alive in the system. Also, by efficiently combining the traditional multi-authority
scheme with TMACS, we construct a hybrid one, which satisfies the scenario of attributes coming from different authorities as
well as achieving security and system-level robustness.
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
Cloud computing is a model for enabling for on demand network access to shared
configurable computing resources (e.g. networks, servers, storage, applications, and services).It is
based on virtualization and distributed computing technologies. Cloud Data storage systems enable
user to store data efficiently on server without any trouble of data resources. User can easily store
and retrieve their data remotely. The two biggest concerns about cloud data storage are reliability and
security. Clients aren’t like to entrust their data to another third party or companies without a
guarantee that they will be able to access therein formations whenever they want. In the existing
system, the data are stored in the cloud using dynamic data operation with computation which makes
the user need to make a copy for further updating and verification of the data loss. Different
distributed storing auditing techniques are used for overcoming the problem of data loss. Recent
work of this paper has show that data partitioning technique used for data storage by providing
Digital signature to every partitioning data and user .this technique allow user to upload or retrieve
the data with matching the digital signatures provided to them. This method ensures high cloud
storage integrity, enhanced error localization and easy identification of misbehaving server and
unauthorized access to the cloud server. Hence this work aims to store the data securely in reduced
space with less time and computational cost.
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
This paper proposes various methods for anonymous authentication for data stored in cloud. Cloud verifies the authenticity
of the series without knowing the user’s identity before storing data. This paper also has the added feature of access control in which
only valid users are able to decrypt the stored information. These schemes also prevents replay attacks and supports creation,
modification, and reading data stored in the cloud. Moreover, our authentication and access control scheme is decentralized and robust,
unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage
overheads are comparable to centralized approaches .The aim of this paper is to cover many security issues arises in cloud computing
and different schemes to prevent security risks in cloud. Storage-as-a-service (Saas) offered by cloud service providers (CSPs) is a paid
facility that enables organizations to outsource their sensitive data to be stored on remote servers. In this paper, we propose a cloudbased
storage schemes that allows the data owner to benefit from the facilities offered by the CSP and enables indirect mutual trust
between them. This Paper provides different authentication techniques and algorithms for cloud security.
Similar to A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchical Attribute-Set-Based Encryption (HASBE) in Cloud Computing (20)
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchical Attribute-Set-Based Encryption (HASBE) in Cloud Computing
1. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 799 - 808, 2014, ISSN:- 2319–8656
www.ijcat.com 799
A Secure, Scalable, Flexible and Fine-Grained Access
Control Using Hierarchical Attribute-Set-Based
Encryption (HASBE) in Cloud Computing
Prashant A. Kadam
Department of Computer Engineering
JSPM Narhe Technical Campus
Pune, India
Avinash S. Devare
Department of Computer Engineering
JSPM Narhe Technical Campus
Pune, India
Abstract: Cloud Computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge
and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud
computing the most important matter of concern are data security and privacy along with flexibility, scalability and fine grained access
control of data being the other requirements to be maintained by cloud systems Access control is one of the prominent research topics
and hence various schemes have been proposed and implemented. But most of them do not provide flexibility, scalability and fine
grained access control of the data on the cloud. In order to address the issues of flexibility, scalability and fine grained access control
of remotely stored data on cloud we have proposed the hierarchical attribute set-based encryption (HASBE) which is the extension of
attribute- set-based encryption(ASBE) with a hierarchical structure of users. The proposed scheme achieves scalability by handling the
authority to appropriate entity in the hierarchical structure, inherits flexibility by allowing easy transfer and access to the data in case
of location switch. It provides fine grained access control of data by showing only the requested and authorized details to the user thus
improving the performance of the system. In addition, it provides efficient user revocation within expiration time, request to view
extra-attributes and privacy in the intra-level hierarchy is achieved. Thus the scheme is implemented to show that is efficient in access
control of data as well as security of data stored on cloud with comprehensive experiments.
Keywords: Fine-grained access control, attribute-set-based encryption, hierarchical attribute-set-based encryption.
1. INTRODUCTION
Cloud Computing refers to both the applications delivered as
services over the Internet and the hardware and systems
software in the data centers that provide those services. The
services themselves have long been referred to as Software as a
Service (SaaS).The datacenter hardware and software is what
we will call a Cloud.
Cloud computing is a web-based application that provides
computation, software, infrastructure, platform, devices and
other resources to users on the basis of pay as you use. Clients
can use cloud services without any installation and the data
uploaded on cloud is accessible from anywhere in the world,
the only requirement is the computer with active internet
connection. As a customizable computing resources and a huge
amount of storage space are provided by internet based online
services, the shift to online storage has contributed greatly in
eliminating the overhead of local machines in storage and
maintenance of data. Cloud provides a number of benefits like
flexibility, disaster management and recovery, pay-per-use and
easy to access and use model which contribute to the reason of
switching to cloud. Cloud gives the provision for storage of
important data of users. Thus cloud helps to free up the space
on the local disk.
Cloud computing has emerged as one of the most influential
paradigms in the IT industry. Almost all companies,
organizations store their valuable data on the cloud and access
it. Due to this security to the cloud is a major concern. Also
flexibility, scalability of data stored on cloud which are the
system performance parameters and which degrade the system
response time required to be handled by cloud systems. They
should provide a secure environment and maintenance of data
in hierarchy.
The prominent security concern is data storage security and
privacy in cloud computing due to its Internet-based data
storage and management. The data security issue becomes vital
when the data is a confidential data. In cloud computing, users
have to give up their data to the cloud service provider for
storage and business operations, while the cloud service
provider is usually a commercial enterprise which cannot be
totally trusted. So the data integrity and privacy of data is at
risk.
Flexible and fine-grained access control is strongly desired in
the service-oriented cloud computing model. Various schemes
which provide access control models have been proposed. But
the problem related with these schemes is that they are limited
to data owners and service providers which exist in the same
trusted domain.
2. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 799 - 808, 2014, ISSN:- 2319–8656
www.ijcat.com 800
2. EXISTING SYSTEM
2.1 Vipul et al.“ (Abe)Attribute based
encryption”. [1]
As more sensitive data is shared and stored by third-party sites
on the Internet, there will be a need to encrypt data stored at
these sites. One drawback of encrypting data, is that it can be
selectively shared only at a coarse-grained level (i.e., giving
another party your private key). We develop a new
cryptosystem for fine-grained sharing of encrypted data that we
call Key-Policy Attribute-Based Encryption (KP-ABE). In our
cryptosystem, cipher texts are labeled with sets of attributes
and private keys are associated with access structures that
control which cipher texts a user is able to decrypt. We
demonstrate the applicability of our construction to sharing of
audit-log information and broadcast encryption. Our
construction supports delegation of private keys which
subsumes Hierarchical Identity-Based Encryption (HIBE).
2.2 Rakesh et al. “Attribute-Sets: A
Practically Motivated Enhancement to
Attribute-Based Encryption”, University of
Illinois at Urbana-Champaign, July 27,
2009. [2]
In distributed systems users need to share sensitive objects with
others base on the recipients‟ ability to satisfy a policy.
Attribute-Based Encryption (ABE) is a new paradigm where
such policies are specified and cryptographically enforced in
the encryption algorithm itself. Cipher text-Policy ABE (CP-
ABE) is a form of ABE where policies are associated with
encrypted data and attributes are associated with keys. In this
work we focus on improving the flexibility of representing user
attributes in keys. Specifically, we propose Cipher text Policy
Attribute Set Based Encryption (CP-ASBE) - a new form of
CP-ABE - which, unlike existing CP-ABE schemes that
represent user attributes as a monolithic set in keys, organizes
user attributes into a recursive set based structure and allows
users to impose dynamic constraints on how those attributes
may be combined to satisfy a policy. We show that the
proposed scheme is more versatile and supports many practical
scenarios more naturally and efficiently. We provide a
prototype implementation of our scheme and evaluate its
performance overhead
2.3 Pankaj et al. “Cloud Computing Security
Issues in Infrastructure as a Service”, 2012.
[3]
Cloud computing is current buzzword in the market. It is
paradigm in which the resources can be leveraged on peruse
basis thus reducing the cost and complexity of service
providers. Cloud computing promises to cut operational and
capital costs and more importantly it let IT departments focus
on strategic projects instead of keeping datacenters running. It
is much more than simple internet. It is a construct that allows
user to access applications that actually reside at location other
than user‟s own computer or other Internet-connected devices.
There are numerous benefits of this construct. For instance
other company hosts user application. This implies that they
handle cost of servers, they manage software updates and
depending on the contract user pays less i.e. for the service
only. Confidentiality, Integrity, Availability, Authenticity, and
Privacy are essential concerns for both Cloud providers and
consumers as well. Infrastructure as a Service (IaaS) serves as
the foundation layer for the other delivery models, and a lack
of security in this layer will certainly affect the other delivery
models, i.e., PaaS, and SaaS that are built upon IaaS layer. This
paper presents an elaborated study of IaaS components‟
security and determines vulnerabilities and countermeasures.
Service Level Agreement should be considered very much
importance.
2.4 John et al. “(CP-ABE) Cipher text-Policy
Attribute-Based Encryption” John et al. [4]
In several distributed systems a user should only be able to
access data if a user posses a certain set of cre- dentials or
attributes. Currently, the only method for enforcing such
policies is to employ a trusted server to store the data and
mediate access control. However, if any server storing the data
is compromised, then the confidentiality of the data will be
compromised. In this paper we present a system for realizing
complex access control on encrypted data that we call Cipher
text-Policy Attribute-Based Encryption. By using our
techniques encrypted data can be kept confidential even if the
storage server is not trusted; moreover, our methods are secure
against collusion attacks. Previous Attribute- Based Encryption
systems used attributes to describe the encrypted data and built
3. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 799 - 808, 2014, ISSN:- 2319–8656
www.ijcat.com 801
policies into user‟s keys; while in our system attributes are
used to describe a user‟s credentials, and a party encrypting
data deter-mines a policy for who can decrypt. Thus, our meth-
ods are conceptually closer to traditional access control
methods such as Role-Based Access Control (RBAC). In
addition, we provide an implementation of our sys- tem and
give performance measurements.
2.5 Ayad et al. “Enabling Data Dynamic and
Indirect Mutual Trust for Cloud Computing
Storage System”, 2012. [6]
In this paper, we propose a cloud-based storage scheme that
allows the data owner to benefit from the facilities offered by
the CSP and enables indirect mutual trust between them. The
proposed scheme has four important features: (i) it allows the
owner to outsource sensitive data to a CSP, and perform full
block-level dynamic operations on the outsourced data, i.e.,
block modification, insertion, deletion, and append, (ii) it
ensures that authorized users (i.e., those who have the right to
access the owner‟s file) receive the latest version of the
outsourced data, (iii) it enables indirect mutual trust between
the owner and the CSP, and (iv) it allows the owner to grant or
revoke access to the outsourced data. We discuss the security
issues of the proposed scheme. Besides, we justify its
performance through theoretical analysis and experimental
evaluation of storage, communication, and computation
overheads.
2.6 Guojun et al. “Hierarchical attribute-
based encryption and scalable user
revocation for sharing data in cloud
servers”, 2011. [8]
With rapid development of cloud computing, more and more
enterprises will outsource their sensitive data for sharing in a
cloud. To keep the shared data confidential against untrusted
cloud service providers (CSPs), a natural way is to store only
the encrypted data in a cloud. The key problems of this
approach include establishing access control for the encrypted
data, and revoking the access rights from users when they are
no longer authorized to access the encrypted data. This paper
aims to solve both problems. First, we propose a hierarchical
attribute-based encryption scheme (HABE) by combining a
hierarchical identity-based encryption (HIBE) system and a
ciphertext-policy attribute-based encryption (CP-ABE) system,
so as to provide not only fine-grained access control, but also
full delegation and high performance. Then, we propose a
scalable revocation scheme by applying proxy re-encryption
(PRE) and lazy re-encryption (LRE) to the HABE scheme, so
as to efficiently revoke access rights from users.
2.7 Qin et al. “Hierarchical Attribute-Based
Encryption for Fine-Grained Access Control
in Cloud Storage Services”. [9]
Cloud computing, as an emerging computing paradigm,
enables users to remotely store their data into a cloud so as to
enjoy scalable services on-demand. Especially for small and
medium-sized enterprises with limited budgets, they can
achieve cost savings and productivity enhancements by using
cloud-based services to manage projects, to make
collaborations, and the like. However, allowing cloud service
providers (CSPs), which are not in the same trusted domains as
enterprise users, to take care of confidential data, may raise
potential security and privacy issues. To keep the sensitive user
data confidential against untrusted CSPs, a natural way is to
apply cryptographic approaches, by disclosing decryption keys
only to authorized users. However, when enterprise users
outsource confidential data for sharing on cloud servers, the
adopted encryption system should not only support fine-
grained access control, but also provide high performance, full
delegation, and scalability, so as to best serve the needs of
accessing data anytime and anywhere, delegating within
enterprises, and achieving a dynamic set of users. In this paper,
we propose a scheme to help enterprises to efficiently share
confidential data on cloud servers. We achieve this goal by first
combining the hierarchical identity-based encryption (HIBE)
system and the cipher text-policy attribute-based encryption
(CP-ABE) system, and then making a performance-
expressivity tradeoff, finally applying proxy re-encryption and
lazy re-encryption to our scheme.
2.8. Patrick et al. “Methods and Limitations
of Security Policy Reconciliation”. [10]
A security policy is a means by which participant session
requirements are specified. However, existing frameworks
provide limited facilities for the automated reconciliation of
4. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 799 - 808, 2014, ISSN:- 2319–8656
www.ijcat.com 802
participant policies. This paper considers the limits and
methods of reconciliation in a general-purpose policy model.
We identify an algorithm for efficient two-policy
reconciliation, and show that, in the worst-case, reconciliation
of three or more policies is intractable. Further, we suggest
Efficient heuristics for the detection and resolution of
intractable reconciliation. Based upon the policy model, we
describe the design and implementation of the Ismene policy
language. The expressiveness of Ismene, and indirectly of our
model, is demonstrated through the representation and
exposition of policies supported by existing policy languages.
We conclude with brief notes on the integration and
enforcement of Ismene policy within the Antigone.
3. PROPOSED SYSTEM
In our propose system instead of showing complete data from
cloud we are fetching only those data which is essential for that
user. We are not fetching all data so it takes less time for
fetching data so system response time is very less due to which
system performance increases. We are performing encryption
before storing data so even if data get hack by hacker data
cannot be easily understand by hacker. We are performing
hierarchical structure so even if lower authority is absent for
particular days at that time higher authority handle all work of
lower authority so work of company will not be stopped. The
HASBE scheme for realizing scalable, flexible and fine-
grained access control in cloud computing. The HASBE
scheme seamlessly incorporates a hierarchical structure of
system users by applying a delegation algorithm to ASBE.
HASBE not only supports compound attributes due to flexible
attribute set combinations, but also achieves efficient user
revocation because of multiple value assignments of attributes.
We formally proved the security of HASBE based on the
security of CP-ABE. Finally, we completed the detailed
analysis of proposed scheme, and conducted comprehensive
performance analysis and evaluation, which showed its
efficiency and advantages over existing schemes.
3.1 Project Scope
1. This system is designed to provide security to data
stored on cloud and improve performance of system
by showing only the required details requested by an
employee.
2. Security is provided by generating a secret key from
the various attributes stated in the form which is
filled by the employee at the time of registration.
3. This system is designed to provide flexibility of the
data where in case of transfer of employee, his data
could be transferred to respective location with ease.
4. It also provides scalability in case when an employee
is absent his work could be handled by the senior
employee securely.
Figure 1. General Architecture of the System
3.1 Methodology
1. Registration and login by user:
In this user fill his/her own complete data. Request is sent to
the CEO for confirmation. CEO confirms his/her request and
assigns attribute and time period for that user. Once Account
get confirm password and key is sent to that user by email so
he/she can access his/her account.
2. Approve User and Assign attributes:
Out of the selected attributes according the roles defined in
hierarchy of the system the attribute visibility access is
decided. Each attribute is encrypted.
3. Key Generation and Verification
Key is generated based on the attributes filled by the user in
registration form. In attribute key verification, when a key is
used for login ,it is first checked with the key stored in the
database. If a match is found then user is allowed for further
process else the user is rejected for further process.
4. Encryption and decryption of data
User fills his/her data during registration. Once it is click on
submit button data is send to encryption algorithm that are
RSA and AES. After performing encryption data is stored in
encrypted format in database.
5. Access Right:
The user can view the selected attributes of the same level as
well as other levels according to the access authority using
attribute key.
5. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 799 - 808, 2014, ISSN:- 2319–8656
www.ijcat.com 803
6. Fine Grained Access
In our propose system instead of showing complete data, the
fetching of necessary data is allowed. Due to this system
provides a quick response time.
7. Request for extra attribute:
The user can access attributes of same level as inter level
counterparts. He can request for extra attributes in case of
emergency as well as ease of work.
8. Flexibility
In this module flexibility can be done by suppose user is
transfer from one location to another location and for that new
location that user‟s data is not accessible then authority request
for accessing data of that user from old location. Once
authority got request that data should be access from new
location and it is not visible for old location
9. Scalability:
We are performing hierarchical structure so even if lower
authority is absent for particular days at that time higher
authority handle all work of lower authority so work of
company will not be stopped.
10. Efficient User Revocation:
It can be done by two steps request to the admin and response
to the user from admin within expiration time.
9. Privacy:
Default it is public but a user can set intra-level privacy by
restricting access to attributes.
3.2 Process Summary
Following Processes will be involved in Project:
1. Encrypt data before Insert
After user click on submit button data encrypted using RSA
and AESs algorithm. Once data get encrypted it is stored into
database and when user wants to retrieve data it again
decrypted and shown in original form.
2. Request for New Attributes
In this phase one of the lower authority may absence then at
that time higher authority may handle both attributes, one is its
own attributes and another is attributes of the lower authority
who is absent for particular time period. User can also request
for new attribute if needed in any case.
3. Getting information of other user
In this when user transfer from one location to another
location at that time new location does not having rights to
access data of that user at that time getting grant for accessing
data of that user. When user‟s data is accessible from new
location then it can -not access from old location.
3.3 System Functional Features
The cloud server provides the six main functions to
the user.
1. Fine-Grained Access
In our propose system instead of showing complete data,
the fetching of necessary data is allowed. Due to this
system provides a quick response time.
2. Scalability
We are performing hierarchical structure so even if
lower authority is absent for particular days at that time
higher authority handle all work of lower authority so
work of company will not be stopped.
3. Flexibility
When an employee gets transferred, his data could be
accessible to the branch where he will be transferred
only not to the older branch. So data will be transferred
on request of CEO safely. Hence data can be transferred
easily between branches.
4. Encryption
Encryption is a process in which data is hidden in a way
that is accessible to the authorized user only. In this
system we are providing encryption (converting into
unreadable) so that data is not accessible by any illegal
user like a hacker.
5. Decryption
Decryption is a process in which encrypted data i.e
unreadable format is converted into readable format.
6. Key Generation and Verification
Key is generated based on the attributes filled by the user
in registration form. In attribute key verification, when a
key is used for login, it is first checked with the key
stored in the database. If a match is found then user is
allowed for further process else the user is rejected for
further process.
4. ALGORITHM AND MATHEMATICAL
MODEL
4.1 Algorithm
4.1.1RSA (Rivest Shamir Adleman)
Key generation
RSA involves a public key and a private key. The public key
can be known by everyone and is used for encrypting
6. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 799 - 808, 2014, ISSN:- 2319–8656
www.ijcat.com 804
messages. Messages encrypted with the public key can only be
decrypted in a reasonable amount of time using the private key.
Encryption
User1 transmits her public key (n, e) to User2 and keeps the
private key secret. User1 then wishes to send message M to
User2.He first turns M into an integer m, such that 0 ≤ m < n
by using an agreed-upon reversible protocol known as a
scheme. He then computes the cipher text c corresponding to
This can be done quickly using the method of exponentiation
by squaring. User1 then transmits c to User2.Note that at least
nine values of m will yield a cipher text c equal to m, but this is
very unlikely to occur in practice.
Decryption
User can recover m from c by using her private key exponent.
Given m, user can recover the original message M by reversing
the padding scheme.
4.1.2 Advanced Encryption Standard Algorithm
The AES algorithm is also used for improving the searching
and access mechanism.
4.2 Mathematical Model
We are using NP-Complete because it gives output within fix
interval of time.
Set Theory Analysis
A] Identify the Employees
E= {e1, e2, e3….}
Where „E‟ is main set of Employees like e1, e2, e3…
B] Identify the Attribute
AT= {at1, at2, at3….}
Where „AT‟ is main set of registered Attribute like at1, at2,
at3…
C] Identify the employee requested For another Attribute
RAA= {raa1, raa2, raa3}
Where „RAA‟ is main set of Request for another Attribute
raa1, raa2, raa3
D] Identify the employee requested for another employee
Information
REI= {rei1, rei2, rei3}
Where „REI‟ is main set of Request for another Attribute rei1,
rei2, rei3
E] Identify Attribute Key of New employee
AK= {ak1, ak2, ak3….}
Where „AK‟ is main set of attribute key of users ak1, ak2,
ak3…
F] Identify the processes as P.
P= {Set of processes}
P = {P1, P2, P3,P4……}
P1 = {e1, e2, e3}
Where
{e1= upload data on server}
{e2= make the entry in database using different encryption
algorithm}
{e3= get new attribute after request}
{e4= get new employee information when employee get
transfer.}
G] Identify failure cases as FL
Failure occurs when –
FL= {F1, F2, F3…}
a) F1= = {f| ‟f‟ if error in uploading due to interrupted Internet
connection}
H] Identify success case SS:-
Success is defined as-
SS= {S1, S2, S3, S4}
7. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 799 - 808, 2014, ISSN:- 2319–8656
www.ijcat.com 805
a) S1= {s|‟s‟ if fast and no interrupted Internet connection}
b) S2= {s|‟s‟ if data is added into database}
c) S2= {s|‟s‟ if data is retrieve from database}
I] Initial conditions as I0
a) User has good internet connection
b) Admin has good internet connection
H is universal set i.e cloud.
H= {E, B, U, R}
E=employee set
B=attribute set
U=user set
R=registered
A] Identify the Employees
E= {e1, e2, e3….}
Where „E‟ is main set of Employees like e1, e2, e3…
B] Identify the Attribute
B= {at1, at2, at3….}
Where „B‟ is main set of registered Attribute like at1, at2,
at3…
C] Identify the employee requested For another
Attribute
A= {raa1, raa2, raa3}
Where „A‟ is main set of Request for another Attribute raa1,
raa2, raa3
INITIAL STATE:
U={R, UR}
R=registered user
UR=unregistered user
INTERMEDIATE STATE:
Request for new attribute
A=request for new attribute
B=contain all the attribute
R=provide requested attribute
S1=A B
Hierarchy
H = {H1, H2, H3, H4}
Where,
H is cloud
H1 is CEO.
H2 is general manager.
8. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 799 - 808, 2014, ISSN:- 2319–8656
www.ijcat.com 806
H3 is the list of managers.
H4 is the list of employees.
FLEXIBILITY:
H= {C1, C2, C3}
Where,
C1 is the old branch of the company where employee worked
before transfer.
C2 is the employee being transferred.
C3 is the new branch where employee got transferred to.
H= {C1, C2, C3}
Where,
S2 is employee data should be accessed to new branch only not
old branch.
S2= (C1-C2) U C3
Scalability
H = {H1, H2, H3, H4}
U= {H1, H2}
U‟= {H3, H4}
U=present user
U‟=absent user
S3
FINAL STATE:
Identify the processes as P.
P= {Set of processes}
P = {P1, P2, P3, P4……}
Where
P1 = {S1, S2, S3}
Where,
{S1= get new attribute after request}
{S2= get new employee information when employee get
transfer.}
{S3= get access of lower authority}
H
H
H
P1 P2 P3 P4
9. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 799 - 808, 2014, ISSN:- 2319–8656
www.ijcat.com 807
FLEXIBILITY:
H= {C1, C2, C3}
Where,
C1 is the old branch of the company where employee worked
before transfer.
C2 is the employee being transferred.
C3 is the new branch where employee got transferred to.
H= {C1, C2, C3}
Where,
S2 is employee data should be accessed to new branch only not
old branch.
S2= (C1-C2) U C3
Scalability
H = {H1, H2, H3, H4}
U= {H1, H2}
U‟= {H3, H4}
U=present user
U‟=absent user
S3
FINAL STATE:
Identify the processes as P.
P= {Set of processes}
P = {P1, P2, P3, P4……}
Where
P1 = {S1, S2, S3}
{S1= get new attribute after request}
{S2= get new employee information when employee get
transfer.}
{S3= get access of lower authority}
H
H
P
H
P1 P2P2 P3 P4
P1
S2 S3S1
10. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 799 - 808, 2014, ISSN:- 2319–8656
www.ijcat.com 808
5. CONCLUSION
Thus, our system efficiently provides a fine grained access
control with flexibility and scalability with a hierarchical
structure in our HASBE system. Our paper will be providing
security to the users from outsiders or intruders by
implementing session hijacking and session fixation security in
our system with sql injection attack prevention. The core is for
sure, a cloud-base thus giving us a choice of multi-user access
including security from intruder attacks. Hence we benefit the
users with attack handling and many advantages over the
existing systems.
6. REFERENCES
[1] Vipul et al.“ (Abe)Attribute based encryption”.
[2] Rakesh et al. “Attribute-Sets: A Practically Motivated
Enhancement to Attribute-Based Encryption”, University of
Illinois at Urbana-Champaign, July 27, 2009
[3] Pankaj et al. “Cloud Computing Security Issues in
Infrastructure as a Service”,2012.
[4] John et al. “(cp-abe) Ciphertext-Policy Attribute-Based
Encryption”John et al..
[5] Suhair et al. “Designing a Secure Cloud-Based EHR
System using Ciphertext-Policy Attribute-Based Encryption”,
2011
[6] Ayad et al. ”Enabling Data Dynamic and Indirect Mutual
Trust for Cloud Computing Storage System”, 2012.
[7]Chandana et al. “Gasbe: A Graded Attribute-Based Solution
For Access Control In Cloud Computing”, 2011.
[8] Guojun et al. “Hierarchical attribute-based encryption and
scalable user revocation for sharing data in cloud servers”,
2011.
[9] Qin et al. “Hierarchical Attribute-Based Encryption for
Fine-Grained Access Control in Cloud Storage Services”.
[10] Patrick et al. “Methods and Limitations of Security Policy
Reconciliation”.
[11]http://searchwindowsserver.techtarget.com/defin
ition/IIS.
[12]http://en.wikipedia.org/wiki/Microsoft_Visual_
Studio
[13] http://en.wikipedia.org/wiki/.NET_Framework.