SlideShare a Scribd company logo
1 of 2
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1069
Abstract-- Cloud security is nowadays is a burning research
topic. In this paper, we present an survey overview of
existing cloud security algorithms. All these algorithms are
described more or less on their own. Cloud security is a very
popular task. We also explain the fundamentals of
sequential rule mining. We describe today’s approaches for
cloud security. From the broad variety of efficient
algorithms that have been developed we will compare the
most important ones. We will systematize the algorithms
and analyse their performance based on both their run time
performance and theoretical considerations. Their strengths
and weaknesses are also investigated. It turns out that the
behaviour of the algorithms is much more similar as to be
expected.
I. LITERATURE SURVEY
Attribute-Based Encryption (ABE) was first proposed by
Sahai and Waters [4] with the name of Fuzzy Identity-Based
Encryption, with the original goal of providing an error-
tolerant identity-based encryption [5] scheme that uses
biometric identities. In [6], Pirretti et al. proposed an
efficient construction of ABE under the Random Oracle
model and demonstrated its application in large-scale
systems. Goyal et al. enhanced the original ABE scheme by
embedding a monotone access structure into user secret key.
The scheme proposed by Goyal et al. is called Key-Policy
Attribute-Based Encryption (KP-ABE) [7], a variant of
ABE. In the same work, Goyal et al. also proposed the
concept of Cipher text-Policy Attribute Based Encryption
(CP-ABE) without presenting a concrete construction. CP-
ABE is viewed as another variant of ABE in which cipher
texts are associated with an access structure. Both KP-ABE
and CP-ABE are able to enforce general access policies that
can be described by a monotone access structure. In [8],
Ostrovsky et al. proposed an enhanced KP-ABE scheme
which supports non-monotone access structures. Chase [9]
enhanced Sahai-Waters ABE scheme and Goyal et al. KP-
ABE scheme by supporting multiple authorities. Further
enhancements to multi-authority ABE can be found.
Bettencourt et al. [10] proposed the first CP-ABE
construction with security under the Generic Group model.
In [11], Cheung et al. presented a CCA-secure CP-ABE
construction under the Decisional Bilinear Diffie-Hellman
(DBDH) assumption. In [12], the CCA secure scheme just
supports AND gates in the access structure. Towards
proposing a provably secure CP-ABE scheme supporting
general access structure, Goyal et al. [13] proposed a CP-
ABE construction with an exponential complexity which
can just be viewed as theoretic feasibility. For the same
goal, Waters [30] proposed another CP-ABE scheme under
various security assumptions. Aside from providing basic
functionalities for ABE, there are also many works proposed
to provide better security/privacy protection for ABE. These
works include CP-ABE with hidden policy, ABE with user
accountability [14], ABE with attribute hierarchy [15] and
etc.
Techni
ques/
Parame
ters
KP-
ABE
EKP-
ABE
CP-
ABE
CP-
ASB
E
HIBE
Access
Control
Low
High
if
assoc
iated
with
re-
encry
ption
techn
ique
Better
than
KP-
ABE
Averag
e
Realiza
tion of
comple
x
Access
Control
Bett
er
than
CP-
ABE
Compa
rative
ly low
Efficien
cy
Aver
age
High
for
broad
cast
type
encry
ption
Higher
thanKP
-ABE
Only
allow
constan
t cipher
text
Averag
e Not
efficien
t for
modern
enterpr
ise
environ
ments
Bett
er
than
CP-
ABE
Less
collu
sion
attac
ks
Better
Lower
when
compa
red
with
ABE
schem
es
Comput
ational
overhea
ds
High
Reduce
s the
comput
ations
Averag
e
Low
er
than
CP-
ABE
Higher
Table 1: Comparison of various security schemes
II. CONCLUSION
In this paper, we surveyed the list of existing cloud security
techniques. We also analyzed the performance of various
attribute based security mechanisms. There strength and
weakness are also compared in a table. In a forthcoming
paper, we pursue the development of a complete
methodology for the proposed model.
Modern Techniques for Providing Security in Cloud Computing
Environment
Dinesh Kumar Bhayal1
Prof. Gajendra Singh2
1,2
SSSIST, Sehore (MP)
Modern Techniques for Providing Security in Cloud Computing Environment
(IJSRD/Vol. 1/Issue 5/2013/0007)
All rights reserved by www.ijsrd.com 1070
REFERENCES
[1] R. Buyya, C. ShinYeo, J. Broberg, and I. Brandic,
“Cloud computing and emerging it platforms: Vision,
hype, and reality for delivering computing as the 5th
utility,” Future Generation Comput. Syst., vol. 25, pp.
599–616, 2009.
[2] Amazon Elastic Compute Cloud (Amazon EC2)
[Online]. Available: http://aws.amazon.com/ec2/
[3] Amazon Web Services (AWS) [Online]. Available:
https://s3.amazonaws. com/
[4] A. Sahai and B. Waters. Fuzzy Identity-Based
Encryption. In Proc. of EUROCRYPT’05, Aarhus,
Denmark, 2005.
[5] D. Boneh and M. Franklin. Identity-Based Encryption
from The Weil Pairing. In Proc. of CRYPTO’01, Santa
Barbara, California, USA, 2001.
[6] M. Pirretti, P. Traynor, P. McDaniel, and B. Waters.
Secure Atrribute-Based Systems. In Proc. of CCS’06,
New York, NY, USA, 2006.
[7] V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-
Based Encryption for Fine-grained Access Control of
Encrypted Data. In Proc. of CCS’06, Alexandria,
Virginia, USA, 2006.
[8] R. Ostrovsky, A. Sahai, and B. Waters. “Attribute-based
encryption with
non-monotonic access structures”. In Proc. of CCS’06,
New York, NY, 2007.
[9] M. Chase. “Multi-authority attribute based encryption”.
In Proc. of TCC’07,
Amsterdam, Netherlands, 2007.
[10] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-
Policy Attribute-Based Encryption. In Proc. of SP’07,
Washington, DC, USA, 2007.
[11] L. Cheung and C. Newport. Provably Secure Ciphertext
Policy ABE. In Proc. of CCS’07, New York, NY, USA,
2007.
[12] B. Waters, “Ciphertext-Policy Attribute-Based
Encryption: An Expressive, Efficient, and Provably
Secure Realization”, http://eprint.iacr.org/2008/290.
[13] V. Goyal, A. Jain, O. Pandey and A. Sahai, “Bounded
Ciphertext-Policy Attribute based Encryption”, In Proc.
of ICALP’08, Reykjavik, Iceland, 2008
[14] M. J. Hinek, S. Jiang, R. Safavi-Naini, and S. F.
Shahandashti, “Attribute-Based Encryption with Key
Cloning Protection”, http://eprint.iacr.org/2008/478
[15] Jin Li, Qian Wang, Cong Wang, and Kui Ren,
“Enhancing Attribute-based Encryption with Attribute
Hierarchy,” In Proc. of ChinaCom’09, Xi’an, China,
2009.
[16] Vandana birle “ State of the art in cloud security”,
IJSRD, volume 1, issue 2, 2013

More Related Content

Similar to Modern Techniques for Providing Security in Cloud Computing Environment

Information Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docxInformation Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docx
vickeryr87
 
Information Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docxInformation Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docx
annettsparrow
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
michael591
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
sleeperharwell
 
(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings
STO STRATEGY
 
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJEC
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJECCAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJEC
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJEC
TawnaDelatorrejs
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
Editor IJARCET
 

Similar to Modern Techniques for Providing Security in Cloud Computing Environment (20)

Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challenges
 
Information Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docxInformation Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docx
 
Information Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docxInformation Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docx
 
On the Construction of Perfect Keyword Secure PEKS Scheme
On the Construction of Perfect Keyword Secure PEKS SchemeOn the Construction of Perfect Keyword Secure PEKS Scheme
On the Construction of Perfect Keyword Secure PEKS Scheme
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
 
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUDA NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
 
A Novel Framework to Improve Secure Digital Library at Cloud Environment
A Novel Framework to Improve Secure Digital Library at Cloud EnvironmentA Novel Framework to Improve Secure Digital Library at Cloud Environment
A Novel Framework to Improve Secure Digital Library at Cloud Environment
 
Most downloaded article for an year in academia - Advanced Computing: An Inte...
Most downloaded article for an year in academia - Advanced Computing: An Inte...Most downloaded article for an year in academia - Advanced Computing: An Inte...
Most downloaded article for an year in academia - Advanced Computing: An Inte...
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
 
Bibilography
BibilographyBibilography
Bibilography
 
Br36413417
Br36413417Br36413417
Br36413417
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
 
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGEDATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
 
(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings(Pdf) yury chemerkin _i-society-2013 proceedings
(Pdf) yury chemerkin _i-society-2013 proceedings
 
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJEC
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJECCAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJEC
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJEC
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
 
211880_Litterature Review.pptx
211880_Litterature Review.pptx211880_Litterature Review.pptx
211880_Litterature Review.pptx
 
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATADYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
 
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 

More from ijsrd.com

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 

Modern Techniques for Providing Security in Cloud Computing Environment

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1069 Abstract-- Cloud security is nowadays is a burning research topic. In this paper, we present an survey overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today’s approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important ones. We will systematize the algorithms and analyse their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behaviour of the algorithms is much more similar as to be expected. I. LITERATURE SURVEY Attribute-Based Encryption (ABE) was first proposed by Sahai and Waters [4] with the name of Fuzzy Identity-Based Encryption, with the original goal of providing an error- tolerant identity-based encryption [5] scheme that uses biometric identities. In [6], Pirretti et al. proposed an efficient construction of ABE under the Random Oracle model and demonstrated its application in large-scale systems. Goyal et al. enhanced the original ABE scheme by embedding a monotone access structure into user secret key. The scheme proposed by Goyal et al. is called Key-Policy Attribute-Based Encryption (KP-ABE) [7], a variant of ABE. In the same work, Goyal et al. also proposed the concept of Cipher text-Policy Attribute Based Encryption (CP-ABE) without presenting a concrete construction. CP- ABE is viewed as another variant of ABE in which cipher texts are associated with an access structure. Both KP-ABE and CP-ABE are able to enforce general access policies that can be described by a monotone access structure. In [8], Ostrovsky et al. proposed an enhanced KP-ABE scheme which supports non-monotone access structures. Chase [9] enhanced Sahai-Waters ABE scheme and Goyal et al. KP- ABE scheme by supporting multiple authorities. Further enhancements to multi-authority ABE can be found. Bettencourt et al. [10] proposed the first CP-ABE construction with security under the Generic Group model. In [11], Cheung et al. presented a CCA-secure CP-ABE construction under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. In [12], the CCA secure scheme just supports AND gates in the access structure. Towards proposing a provably secure CP-ABE scheme supporting general access structure, Goyal et al. [13] proposed a CP- ABE construction with an exponential complexity which can just be viewed as theoretic feasibility. For the same goal, Waters [30] proposed another CP-ABE scheme under various security assumptions. Aside from providing basic functionalities for ABE, there are also many works proposed to provide better security/privacy protection for ABE. These works include CP-ABE with hidden policy, ABE with user accountability [14], ABE with attribute hierarchy [15] and etc. Techni ques/ Parame ters KP- ABE EKP- ABE CP- ABE CP- ASB E HIBE Access Control Low High if assoc iated with re- encry ption techn ique Better than KP- ABE Averag e Realiza tion of comple x Access Control Bett er than CP- ABE Compa rative ly low Efficien cy Aver age High for broad cast type encry ption Higher thanKP -ABE Only allow constan t cipher text Averag e Not efficien t for modern enterpr ise environ ments Bett er than CP- ABE Less collu sion attac ks Better Lower when compa red with ABE schem es Comput ational overhea ds High Reduce s the comput ations Averag e Low er than CP- ABE Higher Table 1: Comparison of various security schemes II. CONCLUSION In this paper, we surveyed the list of existing cloud security techniques. We also analyzed the performance of various attribute based security mechanisms. There strength and weakness are also compared in a table. In a forthcoming paper, we pursue the development of a complete methodology for the proposed model. Modern Techniques for Providing Security in Cloud Computing Environment Dinesh Kumar Bhayal1 Prof. Gajendra Singh2 1,2 SSSIST, Sehore (MP)
  • 2. Modern Techniques for Providing Security in Cloud Computing Environment (IJSRD/Vol. 1/Issue 5/2013/0007) All rights reserved by www.ijsrd.com 1070 REFERENCES [1] R. Buyya, C. ShinYeo, J. Broberg, and I. Brandic, “Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Generation Comput. Syst., vol. 25, pp. 599–616, 2009. [2] Amazon Elastic Compute Cloud (Amazon EC2) [Online]. Available: http://aws.amazon.com/ec2/ [3] Amazon Web Services (AWS) [Online]. Available: https://s3.amazonaws. com/ [4] A. Sahai and B. Waters. Fuzzy Identity-Based Encryption. In Proc. of EUROCRYPT’05, Aarhus, Denmark, 2005. [5] D. Boneh and M. Franklin. Identity-Based Encryption from The Weil Pairing. In Proc. of CRYPTO’01, Santa Barbara, California, USA, 2001. [6] M. Pirretti, P. Traynor, P. McDaniel, and B. Waters. Secure Atrribute-Based Systems. In Proc. of CCS’06, New York, NY, USA, 2006. [7] V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute- Based Encryption for Fine-grained Access Control of Encrypted Data. In Proc. of CCS’06, Alexandria, Virginia, USA, 2006. [8] R. Ostrovsky, A. Sahai, and B. Waters. “Attribute-based encryption with non-monotonic access structures”. In Proc. of CCS’06, New York, NY, 2007. [9] M. Chase. “Multi-authority attribute based encryption”. In Proc. of TCC’07, Amsterdam, Netherlands, 2007. [10] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext- Policy Attribute-Based Encryption. In Proc. of SP’07, Washington, DC, USA, 2007. [11] L. Cheung and C. Newport. Provably Secure Ciphertext Policy ABE. In Proc. of CCS’07, New York, NY, USA, 2007. [12] B. Waters, “Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization”, http://eprint.iacr.org/2008/290. [13] V. Goyal, A. Jain, O. Pandey and A. Sahai, “Bounded Ciphertext-Policy Attribute based Encryption”, In Proc. of ICALP’08, Reykjavik, Iceland, 2008 [14] M. J. Hinek, S. Jiang, R. Safavi-Naini, and S. F. Shahandashti, “Attribute-Based Encryption with Key Cloning Protection”, http://eprint.iacr.org/2008/478 [15] Jin Li, Qian Wang, Cong Wang, and Kui Ren, “Enhancing Attribute-based Encryption with Attribute Hierarchy,” In Proc. of ChinaCom’09, Xi’an, China, 2009. [16] Vandana birle “ State of the art in cloud security”, IJSRD, volume 1, issue 2, 2013