SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1066
Survey on Data Security with Time Constraint in Clouds
Prajakta Nikam1, Payal Tapadiya2, Sumedha Gaikwad3, Priyanka Ambugle4
1,2,3,4B.E. Students Department of Information Technology, Sinhgad Institute of Technology, Savitribai Phule,
Pune University, Maharashtra, India
---------------------------------------------------------------------***--------------------------------------------------------------------
Abstract— with the rapid development of versatile cloud
services, it becomes increasingly susceptible to use cloud
services to share data in a friend circle in the cloud-
computing environment. Since it is not feasible to
implement full lifecycle privacy security, access control
becomes a challenging task, especially when we share
sensitive data on cloud servers. In order to tackle this
problem, we propose a key-policy attribute-based
encryption with time-specified attributes (KP-TSABE), a
novel secure data self-destructing scheme in cloud
computing. In the KP-TSABE scheme, every ciphertext was
labeled with a time interval while private key is associated
with a time instant. The ciphertext can only be decrypt if
both the time instant is in the allowed time interval and the
attributes associated with the ciphertext satisfy the key’s
access structure. The KP-TSABE is able to solve some
important security problems by supporting user defined
authorization period and by providing fine-grained access
control during the period. The sensitive data will be
securely self-destructed after a user-specified expiration
time. The KP-TSABE scheme is proved secure under the
decision l-bilinear Diffie-Hellman inversion (l-Expanded
BDHI) assumption. Comprehensive comparisons of the
security properties indicate that the KP-TSABE scheme
proposed by us satisfies the security requirements and is
superior to other existing schemes
Keywords: Sensitive Data, Secure Self-Destructing, Fine
Grained Access Control, Privacy-Preserving, Cloud
Computing
I. INTRODUCTION
With the speedy development of versatile cloud offerings,
it becomes increasing style of vulnerable to use cloud
services to proportion facts throughout a brother circle
among the cloud computing surroundings. As results of its
not viable to position in result complete life-cycle privacy
security, get admission to manage becomes a tricky
endeavor, particularly once we have a tendency to share
sensitive information on cloud servers.
The shared data in cloud servers, however, generally
contains user’s sensitive information and needs to be
protected. Because of the possession of the information is
separated from the administration of them, the cloud
servers might migrate user’s data to different cloud servers
in outsourcing or share them in cloud looking. Therefore, it
becomes a massive challenge to protect the privacy of this
shared data in cloud, notably in cross-cloud and huge data
surroundings. Therefore on fulfill this challenge; it is a
necessity to vogue a comprehensive resolution to support
user-defined authorization quantity and to supply fine-
grained access management throughout this era. The
shared data need to be self-destroyed once the user made
public expiration time.
II. LITERATURE SURVEY
A. Attribute-based encryption:
Attribute-based Attribute-based encoding is one among
the important applications of fuzzy identification-primarily
primarily based encoding. ABE comes in favors known as
KP-ABE and cipher text policy ABE (CP-ABE). In CP-ABE,
the cipher text is related to the get entry to structure
whereas the personal key carries a collection of attributes.
Be then court docket et al. projected the primary CPABE
theme, the disadvantage in their theme is that safety proof
became handiest engineered underneath the well-known
establishment version. To subsume this liability, Cheung et
al. provided the other construction beneath a classy model.
Waters used a linear secret sharing theme (LSSS) matrix as
a most popular set of get entry to structures over the
attributes associate degreed projected an economical and
incontrovertibly comfortable CP-ABE theme to a lower
place the standard version. In KP-ABE, the construct is
reversed the cipher matter content consists of a collection
of attributes and therefore the personal secret is
expounded to the get entry to structure. The primary
production of KP-ABE theme was projected. In their theme,
once a user created a secret request, the relied on
authority determined that mixture of attributes have to be
compelled to appear inside the cipher matter content for
the user to decode. instead of the employment of the
Shamir mystery key technique within the private key, this
theme used an additional generalized form of secret
sharing to place into impact a monotonic get right of entry
to tree. Ostrovsky et al. provided the primary KP-ABE
machine that supports the no monotone formulas in key
rules. Yu et al. used a combining technique of KP-ABE,
proxy encoding, and lazy re-encryption, which allows the
records owner to delegate most of the computation
obligations involved in fine-grained data access
management to untrusted cloud servers while not
revealing the underlying facts contents. Tysowski et al.
changed the ABE and leveraged re-encryption algorithmic
rule to endorse a unique theme to protect mobile user’s
facts in cloud computing surroundings. Attributable to the
shortage of your time constraints, the above-stated ABE
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1067
schemes don't guide user-defined authorization period and
comfortable self-destruction when expiration for privacy-
maintaining of the records lifecycle in cloud computing
B. Secure self-destruction scheme:
A noted technique for addressing this drawback is relaxed
deletion of touchy statistics when expiration whereas the facts
became used. Currently, Cachin et al. employed a coverage
graph to elucidate the link among attributes and therefore the
protection magnificence and projected a coverage-based
secure statistics deletion theme. Reardon et al. leveraged the
graph construct, Btree form and key wrapping and projected a
novel approach to the planning and analysis of comfortable
deletion for persistent storage devices. Attributable to the
homes of bodily garage media, the above-cited strategies are
not applicable for the cloud computing surroundings because
the deleted statistics could also be recovered only inside the
cloud servers. A records self-destructing theme, 1st projected
by means of Geambasuetal, could be a promising technique
that styles a Vanish device permits customers to regulate over
the lifecycle of the touchy facts. Wang et al. improved the
Vanish device and projected a relaxed self-destructing theme
for digital facts (SSDD). Within the SSDD theme, information is
encrypted right into a cipher text that has then associated and
extracted to create it incomplete to face up to towards the
standard cryptanalytics and therefore the brute-pressure
attack. Then, each the decoding key and therefore the
extracted cipher text area unit assigned into a distributed
hash table (DHT) network to place Into impact self-
destruction when the update length of the DHT network.
However, Wolchok et al. created variety of experiments and
confirmed that the Vanish machine is prone to Sybil attacks by
the employment of the Vuze DHT community. Therefore, the
security of the SSDD theme is likewise questionable. To
deal with this problem, Zeng et al
C. Time Specific Encryption:
A noted technique for addressing this drawback is relaxed
deletion of touchy statistics when expiration whereas the
facts became used. Currently, Cachin et al. employed a
coverage graph to elucidate the link among attributes and
therefore the protection magnificence and projected a
coverage-based secure statistics deletion theme. Reardon
et al. leveraged the graph construct, Btree form and key
wrapping and projected a novel approach to the planning
and analysis of comfortable deletion for persistent storage
devices. Attributable to the homes of bodily garage media,
the above-cited strategies are not applicable for the cloud
computing surroundings because the deleted statistics
could also be recovered only inside the cloud servers. A
records self-destructing theme, 1st projected by means of
Geambasuetal, is a promising technique that styles a
Vanish device permits customers to regulate over the
lifecycle of the touchy facts. Wang et al. improved the
Vanish device and projected a relaxed self-destructing
theme for digital facts (SSDD). Within the SSDD theme,
information is encrypted right into a cipher text that has
then associated and extracted to create it incomplete to
face up to towards the standard cryptanalytics and
therefore the brute-pressure attack. Then, each the
decoding key and therefore the extracted cipher text area
unit assigned into a distributed hash table (DHT) network
to place into impact self-destruction when the update
length of the DHT network. However, Wolchok et al.
created variety of experiments and confirmed that the
Vanish machine is prone to Sybil attacks by the
employment of the Vuze DHT community. Therefore, the
security of the SSDD theme is likewise questionable. To
deal with this problem, Zeng et al. projected a SeDas
appliance that could be a singular integration of
cryptographical techniques with active storage techniques.
Xiong et al. leveraged the DHT network associate degreed
identity-based altogether encoding (IBE) and projected an
IBE-based comfortable self-destruction (ISS) theme. To be
ready to guard the confidentiality and privacy protection
of the composite files within the complete lifecycle in cloud
computing, Xiong et al. applied the ABE algorithmic rule to
suggest a comfy self-destruction theme for composite
documents (SelfDoc). These days, Xiong et al. used
identification-based altogether timed-launch encoding
(identification-TRE) algorithmic rule [9] and therefore the
DHT network and projected a full lifecycle privacy
protection theme for sensitive facts (FullPP), that is
capable of supply full lifecycle privateers safety for
customers’ touchy records with the help of creating it
unclear previous a predefined time and robotically
destructed when expiration [3]. The principle plan of the
above-noted schemes is that they severally integrate
specific cryptographical techniques with the DHT network
to supply fine-grained data get admission to regulate
throughout the lifecycle of the enclosed records and to
place into impact records self-destruction when expiration.
However, the usage of the DHT network can lead to the fact
that the lifecycle.
III. SYSTEM DESCRIPTION
We propose a key-policy attribute-based encryption with
time-specified attributes (KP-TSABE), a novel secure data
self-destructing scheme in cloud computing. In the KP-
TSABE scheme, every ciphertext is labeled with a time
interval while private key is associated with a time instant.
The ciphertext can only be decrypted if both the time
instant is in the allowed time interval and the attributes
associated with the ciphertext satisfy the key’s access
structure. The KP-TSABE is able to solve some important
security problems by supporting userdefined
authorization period and by providing fine-grained access
control during the period. The sensitive data will be
securely self-destructed after a user-specified expiration
time. The KP-TSABE scheme is proved secure under the
decision l-bilinear Diffie-Hellman inversion (l-Expanded
BDHI) assumption. Comprehensive comparisons of the
security properties indicate that the KP-TSABE scheme
proposed by us satisfies the security requirements and is
superior to other existing schemes.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1068
Modules:
The system is proposed to have the following modules
along with functional requirements.
Sensitive data, secure self-destructing fine-grained access
control, privacy-preserving cloud computing
 Register
In This Module New User Register The
Information In The Order Of The List For Client
Purpose.
 Login:
In This Module User Can Login By Using His/Her
Name And Key.
 Sensitive data:
As the-state-of-the-art of the secure self-
destruction scheme, both SSDD and FullPP have
some limitations. First, SSDD does not consider the
issue of the desired release time of the sensitive
data the expiration time of both SSDD and FullPP
schemes is limited by the DHT network and cannot
be determined by the user. Second, SSDD and
many other schemes are dependent on the ideal
assumption of “No attacks on VDO (vanishing data
object) before it expire”. Third, it is demonstrated
that the Vanish scheme is vulnerable to the Sybil
attacks from the DHT network, the SSDD scheme
and other schemes are similar. As a result,
denoting that the encrypted data item can only be
decrypted between The data owner encrypts
his/her data to share with users in the system, in
which every users key is associated with an access
tree and each leaf node is associated with a time
instant, The access tree of each user can be
defined as a
 Secure self-destructing:
A data self-destructing scheme, first proposed by
Geambasu et al., is a promising approach which
designs a Vanish system enables users to control
over the lifecycle of the sensitive data. Wang et al.
improved the Vanish system and proposed a
secure self-destructing scheme for electronic data
(SSDD). In the SSDD scheme, a data is encrypted
into a ciphertext, self-destructing scheme for data
sharing in cloud computing. We first introduce the
notion of KP-TSABE, formalize the model of KP-
TSABE and give the security model of it. Then, we
give a specific construction method about the
scheme. Finally, we prove that the KP-TSABE
scheme is secure.
 Fine-grained access control
In order to implement fine-grained access control,
we associate every attribute in the attribute set
with a time interval (authorization period). The
attribute is valid if and only if the current time
instant is in this time interval. Only if the valid
attribute in the ciphertext satisfies the access tree
in the key, the algorithm can decrypt the message
correctly. The algorithm level of the KP-TSABE
scheme includes four algorithms: Setup, Encrypt,
KeyGen, and Decrypt.
 Privacy-preserving:
Due to the lack of time constraints, the above-
mentioned ABE schemes do not support user-
defined authorization period and secure self-
destruction after expiration for privacy-preserving
of the data lifecycle in cloud computing. Therefore,
it becomes a big challenge to protect the privacy of
those shared data in cloud, especially in cross-
cloud and big data environment [5]. In order to
meet this challenge, it is necessary to design a
comprehensive solution to support user-defined
authorization period and to provide fine-grained
access control during this period. The shared data
should be self-destroyed after the user-defined
expiration time.
 Cloud computing
Tysowski et al. modified the ABE and leveraged
re-encryption algorithm to propose a novel
scheme to protect mobile user’s data in cloud
computing environment. Due to the lack of time
constraints, the above-mentioned ABE schemes do
not support user-defined authorization period and
secure self-destruction after expiration for
privacy-preserving of the data lifecycle in cloud
computing. It is a time interval from the creation
of the shared data, authorization period to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1069
expiration time. This paper provides full lifecycle
privacy protection for shared data in cloud
computing
 Upload:
User Want To every File Upload Here This Module
Convert to Your File Ciper Text Again Your Process
Is Completed.
 Download:
User Want to Download to Your File Here Its
Before That Must Want To Key of the Data File
Name And Key submitted Then Your Original File
is Download.
VI. CONCLUSION
In cloud storage system, secure information destruction is
one in all the problems that require to be addressed in
information security.
Many information destruction schemes are projected in
recent years. However, there are still some limitations. In
this paper, we principally concentrate on the ciphertext
destruction and propose a secure ciphertext self-
destruction scheme with attribute-based encryption
known as SCSD that applies the attribute-based encryption
and the distributed hash table technology to the method of
knowledge destruction within the cloud storage
environment. Compared with the present schemes, our
theme will resist the normal cryptanalysis attack as well
because the Sybil attacks within the DHT network. Besides,
the performance of SCSD scheme is comparatively effective
and efficient.
REFERENCES
[1] B. Wang, B. Li, and H. Li, “Oruta: Privacy-preserving
public auditingfor shared data in the cloud,” Cloud
Computing, IEEE Transactions on, vol. 2, no. 1, pp. 43–
56, 2014.
[2] J. Xiong, Z. Yao, J. Ma, X. Liu, Q. Li, and J. Ma, “Priam:
Privacy preserving identity and access management
scheme in cloud,” KSII Transactions on Internet and
Information Systems (TIIS), vol. 8, no. 1, pp. 282–304,
2014.
[3] J. Xiong, F. Li, J. Ma, X. Liu, Z. Yao, and P. S. Chen, “A full
lifecycle privacy protection scheme for sensitive data
in cloud computing,” Peerto-Peer Networking and
Applications. [Online]. Available:
http://dx.doi.org/10.1007/s12083-014-0295-x
[4] P. Jamshidi, A. Ahmad, and C. Pahl, “Cloud migration
research: A systematic review,” Cloud Computing, IEEE
Transactions on, vol. 1, no. 2, pp. 142–157, 2013.
[5] R. Lu, H. Zhu, X. Liu, J. K. Liu, and J. Shao, “Toward
efficient and privacy-preserving computing in big data
era,” Network, IEEE, vol. 28, no. 4, pp. 46–50, 2014.
[6] X. Liu, J. Ma, J. Xiong, and G. Liu, “Ciphertext-policy
hierarchical attribute-based encryption for fine-
grained access control of encryption data,”
International Journal of Network Security, vol. 16, no.
4, pp. 351–357, 2014.
[7] Sahai and B. Waters, “Fuzzy identity-based encryption,”
in Advances in Cryptology–EUROCRYPT 2005, ser. LNCS,
vol. 7371. Springer, 2005, pp. 457–473.
[8] Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-
based encryption for fine-grained access control of
encrypted data,” in Proceedings of the 13th ACM
conference on Computer and Communications
Security. ACM, 2006, pp. 89–98.
[9] F. Chan and I. F. Blake, “Scalable, server-passive,
useranonymous timed release cryptography,” in
Proceedings of the International Conference on
Distributed Computing Systems. IEEE, 2005, pp. 504–
513.
[10]K. G. Paterson and E. A. Quaglia, “Time-specific
encryption,” in Security and Cryptography for Networks.
Springer, 2010, pp. 1–16.
[11]Q. Li, J. Ma, R. Li, J. Xiong, and X. Liu, “Large universe
decentralized key-policy attribute-based encryption,”
Security and Communication Networks, 2014. [Online].
Available: http://dx.doi.org/10.1002/sec.997
[12]J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy
attribute-based encryption,” in Proceedings of the 28th
IEEE Symposium on Security and Privacy. IEEE, 2007,
pp. 321– 334.
[13] L. Cheung and C. C. Newport, “Provably secure
ciphertext policy abe,” in Proceedings of the 14th ACM
conference on Computer and communications
security. ACM, 2007, pp. 456– 465.
[14] Waters, “Cipher text - policy attribute - based
encryption: An expressive, efficient, and provably
secure realization,” Public Key Cryptography–PKC
2011, pp. 53–70, 2011.
[15]Shamir, “How to share a secret,” Communications of the
ACM, vol. 22, no. 11, pp. 612–613, 1979.

More Related Content

What's hot

Secure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in CloudSecure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in Cloud1crore projects
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataIRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET Journal
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersIRJET Journal
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
 
IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNRIRJET Journal
 
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloudtheijes
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationTmks Infotech
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Editor IJARCET
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...IRJET Journal
 

What's hot (18)

Secure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in CloudSecure Auditing and Deduplicating Data in Cloud
Secure Auditing and Deduplicating Data in Cloud
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNR
 
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
 
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
 

Similar to Survey on Data Security with Time Constraint in Clouds

Secure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in CloudsSecure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in CloudsIRJET Journal
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAIRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET Journal
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...IRJET Journal
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET Journal
 
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATASECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATAIRJET Journal
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET Journal
 
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud ComputingAn Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computingijtsrd
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 

Similar to Survey on Data Security with Time Constraint in Clouds (20)

Secure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in CloudsSecure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in Clouds
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud Storage
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud StorageIRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
 
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATASECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud ComputingAn Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

Survey on Data Security with Time Constraint in Clouds

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1066 Survey on Data Security with Time Constraint in Clouds Prajakta Nikam1, Payal Tapadiya2, Sumedha Gaikwad3, Priyanka Ambugle4 1,2,3,4B.E. Students Department of Information Technology, Sinhgad Institute of Technology, Savitribai Phule, Pune University, Maharashtra, India ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract— with the rapid development of versatile cloud services, it becomes increasingly susceptible to use cloud services to share data in a friend circle in the cloud- computing environment. Since it is not feasible to implement full lifecycle privacy security, access control becomes a challenging task, especially when we share sensitive data on cloud servers. In order to tackle this problem, we propose a key-policy attribute-based encryption with time-specified attributes (KP-TSABE), a novel secure data self-destructing scheme in cloud computing. In the KP-TSABE scheme, every ciphertext was labeled with a time interval while private key is associated with a time instant. The ciphertext can only be decrypt if both the time instant is in the allowed time interval and the attributes associated with the ciphertext satisfy the key’s access structure. The KP-TSABE is able to solve some important security problems by supporting user defined authorization period and by providing fine-grained access control during the period. The sensitive data will be securely self-destructed after a user-specified expiration time. The KP-TSABE scheme is proved secure under the decision l-bilinear Diffie-Hellman inversion (l-Expanded BDHI) assumption. Comprehensive comparisons of the security properties indicate that the KP-TSABE scheme proposed by us satisfies the security requirements and is superior to other existing schemes Keywords: Sensitive Data, Secure Self-Destructing, Fine Grained Access Control, Privacy-Preserving, Cloud Computing I. INTRODUCTION With the speedy development of versatile cloud offerings, it becomes increasing style of vulnerable to use cloud services to proportion facts throughout a brother circle among the cloud computing surroundings. As results of its not viable to position in result complete life-cycle privacy security, get admission to manage becomes a tricky endeavor, particularly once we have a tendency to share sensitive information on cloud servers. The shared data in cloud servers, however, generally contains user’s sensitive information and needs to be protected. Because of the possession of the information is separated from the administration of them, the cloud servers might migrate user’s data to different cloud servers in outsourcing or share them in cloud looking. Therefore, it becomes a massive challenge to protect the privacy of this shared data in cloud, notably in cross-cloud and huge data surroundings. Therefore on fulfill this challenge; it is a necessity to vogue a comprehensive resolution to support user-defined authorization quantity and to supply fine- grained access management throughout this era. The shared data need to be self-destroyed once the user made public expiration time. II. LITERATURE SURVEY A. Attribute-based encryption: Attribute-based Attribute-based encoding is one among the important applications of fuzzy identification-primarily primarily based encoding. ABE comes in favors known as KP-ABE and cipher text policy ABE (CP-ABE). In CP-ABE, the cipher text is related to the get entry to structure whereas the personal key carries a collection of attributes. Be then court docket et al. projected the primary CPABE theme, the disadvantage in their theme is that safety proof became handiest engineered underneath the well-known establishment version. To subsume this liability, Cheung et al. provided the other construction beneath a classy model. Waters used a linear secret sharing theme (LSSS) matrix as a most popular set of get entry to structures over the attributes associate degreed projected an economical and incontrovertibly comfortable CP-ABE theme to a lower place the standard version. In KP-ABE, the construct is reversed the cipher matter content consists of a collection of attributes and therefore the personal secret is expounded to the get entry to structure. The primary production of KP-ABE theme was projected. In their theme, once a user created a secret request, the relied on authority determined that mixture of attributes have to be compelled to appear inside the cipher matter content for the user to decode. instead of the employment of the Shamir mystery key technique within the private key, this theme used an additional generalized form of secret sharing to place into impact a monotonic get right of entry to tree. Ostrovsky et al. provided the primary KP-ABE machine that supports the no monotone formulas in key rules. Yu et al. used a combining technique of KP-ABE, proxy encoding, and lazy re-encryption, which allows the records owner to delegate most of the computation obligations involved in fine-grained data access management to untrusted cloud servers while not revealing the underlying facts contents. Tysowski et al. changed the ABE and leveraged re-encryption algorithmic rule to endorse a unique theme to protect mobile user’s facts in cloud computing surroundings. Attributable to the shortage of your time constraints, the above-stated ABE
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1067 schemes don't guide user-defined authorization period and comfortable self-destruction when expiration for privacy- maintaining of the records lifecycle in cloud computing B. Secure self-destruction scheme: A noted technique for addressing this drawback is relaxed deletion of touchy statistics when expiration whereas the facts became used. Currently, Cachin et al. employed a coverage graph to elucidate the link among attributes and therefore the protection magnificence and projected a coverage-based secure statistics deletion theme. Reardon et al. leveraged the graph construct, Btree form and key wrapping and projected a novel approach to the planning and analysis of comfortable deletion for persistent storage devices. Attributable to the homes of bodily garage media, the above-cited strategies are not applicable for the cloud computing surroundings because the deleted statistics could also be recovered only inside the cloud servers. A records self-destructing theme, 1st projected by means of Geambasuetal, could be a promising technique that styles a Vanish device permits customers to regulate over the lifecycle of the touchy facts. Wang et al. improved the Vanish device and projected a relaxed self-destructing theme for digital facts (SSDD). Within the SSDD theme, information is encrypted right into a cipher text that has then associated and extracted to create it incomplete to face up to towards the standard cryptanalytics and therefore the brute-pressure attack. Then, each the decoding key and therefore the extracted cipher text area unit assigned into a distributed hash table (DHT) network to place Into impact self- destruction when the update length of the DHT network. However, Wolchok et al. created variety of experiments and confirmed that the Vanish machine is prone to Sybil attacks by the employment of the Vuze DHT community. Therefore, the security of the SSDD theme is likewise questionable. To deal with this problem, Zeng et al C. Time Specific Encryption: A noted technique for addressing this drawback is relaxed deletion of touchy statistics when expiration whereas the facts became used. Currently, Cachin et al. employed a coverage graph to elucidate the link among attributes and therefore the protection magnificence and projected a coverage-based secure statistics deletion theme. Reardon et al. leveraged the graph construct, Btree form and key wrapping and projected a novel approach to the planning and analysis of comfortable deletion for persistent storage devices. Attributable to the homes of bodily garage media, the above-cited strategies are not applicable for the cloud computing surroundings because the deleted statistics could also be recovered only inside the cloud servers. A records self-destructing theme, 1st projected by means of Geambasuetal, is a promising technique that styles a Vanish device permits customers to regulate over the lifecycle of the touchy facts. Wang et al. improved the Vanish device and projected a relaxed self-destructing theme for digital facts (SSDD). Within the SSDD theme, information is encrypted right into a cipher text that has then associated and extracted to create it incomplete to face up to towards the standard cryptanalytics and therefore the brute-pressure attack. Then, each the decoding key and therefore the extracted cipher text area unit assigned into a distributed hash table (DHT) network to place into impact self-destruction when the update length of the DHT network. However, Wolchok et al. created variety of experiments and confirmed that the Vanish machine is prone to Sybil attacks by the employment of the Vuze DHT community. Therefore, the security of the SSDD theme is likewise questionable. To deal with this problem, Zeng et al. projected a SeDas appliance that could be a singular integration of cryptographical techniques with active storage techniques. Xiong et al. leveraged the DHT network associate degreed identity-based altogether encoding (IBE) and projected an IBE-based comfortable self-destruction (ISS) theme. To be ready to guard the confidentiality and privacy protection of the composite files within the complete lifecycle in cloud computing, Xiong et al. applied the ABE algorithmic rule to suggest a comfy self-destruction theme for composite documents (SelfDoc). These days, Xiong et al. used identification-based altogether timed-launch encoding (identification-TRE) algorithmic rule [9] and therefore the DHT network and projected a full lifecycle privacy protection theme for sensitive facts (FullPP), that is capable of supply full lifecycle privateers safety for customers’ touchy records with the help of creating it unclear previous a predefined time and robotically destructed when expiration [3]. The principle plan of the above-noted schemes is that they severally integrate specific cryptographical techniques with the DHT network to supply fine-grained data get admission to regulate throughout the lifecycle of the enclosed records and to place into impact records self-destruction when expiration. However, the usage of the DHT network can lead to the fact that the lifecycle. III. SYSTEM DESCRIPTION We propose a key-policy attribute-based encryption with time-specified attributes (KP-TSABE), a novel secure data self-destructing scheme in cloud computing. In the KP- TSABE scheme, every ciphertext is labeled with a time interval while private key is associated with a time instant. The ciphertext can only be decrypted if both the time instant is in the allowed time interval and the attributes associated with the ciphertext satisfy the key’s access structure. The KP-TSABE is able to solve some important security problems by supporting userdefined authorization period and by providing fine-grained access control during the period. The sensitive data will be securely self-destructed after a user-specified expiration time. The KP-TSABE scheme is proved secure under the decision l-bilinear Diffie-Hellman inversion (l-Expanded BDHI) assumption. Comprehensive comparisons of the security properties indicate that the KP-TSABE scheme proposed by us satisfies the security requirements and is superior to other existing schemes.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1068 Modules: The system is proposed to have the following modules along with functional requirements. Sensitive data, secure self-destructing fine-grained access control, privacy-preserving cloud computing  Register In This Module New User Register The Information In The Order Of The List For Client Purpose.  Login: In This Module User Can Login By Using His/Her Name And Key.  Sensitive data: As the-state-of-the-art of the secure self- destruction scheme, both SSDD and FullPP have some limitations. First, SSDD does not consider the issue of the desired release time of the sensitive data the expiration time of both SSDD and FullPP schemes is limited by the DHT network and cannot be determined by the user. Second, SSDD and many other schemes are dependent on the ideal assumption of “No attacks on VDO (vanishing data object) before it expire”. Third, it is demonstrated that the Vanish scheme is vulnerable to the Sybil attacks from the DHT network, the SSDD scheme and other schemes are similar. As a result, denoting that the encrypted data item can only be decrypted between The data owner encrypts his/her data to share with users in the system, in which every users key is associated with an access tree and each leaf node is associated with a time instant, The access tree of each user can be defined as a  Secure self-destructing: A data self-destructing scheme, first proposed by Geambasu et al., is a promising approach which designs a Vanish system enables users to control over the lifecycle of the sensitive data. Wang et al. improved the Vanish system and proposed a secure self-destructing scheme for electronic data (SSDD). In the SSDD scheme, a data is encrypted into a ciphertext, self-destructing scheme for data sharing in cloud computing. We first introduce the notion of KP-TSABE, formalize the model of KP- TSABE and give the security model of it. Then, we give a specific construction method about the scheme. Finally, we prove that the KP-TSABE scheme is secure.  Fine-grained access control In order to implement fine-grained access control, we associate every attribute in the attribute set with a time interval (authorization period). The attribute is valid if and only if the current time instant is in this time interval. Only if the valid attribute in the ciphertext satisfies the access tree in the key, the algorithm can decrypt the message correctly. The algorithm level of the KP-TSABE scheme includes four algorithms: Setup, Encrypt, KeyGen, and Decrypt.  Privacy-preserving: Due to the lack of time constraints, the above- mentioned ABE schemes do not support user- defined authorization period and secure self- destruction after expiration for privacy-preserving of the data lifecycle in cloud computing. Therefore, it becomes a big challenge to protect the privacy of those shared data in cloud, especially in cross- cloud and big data environment [5]. In order to meet this challenge, it is necessary to design a comprehensive solution to support user-defined authorization period and to provide fine-grained access control during this period. The shared data should be self-destroyed after the user-defined expiration time.  Cloud computing Tysowski et al. modified the ABE and leveraged re-encryption algorithm to propose a novel scheme to protect mobile user’s data in cloud computing environment. Due to the lack of time constraints, the above-mentioned ABE schemes do not support user-defined authorization period and secure self-destruction after expiration for privacy-preserving of the data lifecycle in cloud computing. It is a time interval from the creation of the shared data, authorization period to
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1069 expiration time. This paper provides full lifecycle privacy protection for shared data in cloud computing  Upload: User Want To every File Upload Here This Module Convert to Your File Ciper Text Again Your Process Is Completed.  Download: User Want to Download to Your File Here Its Before That Must Want To Key of the Data File Name And Key submitted Then Your Original File is Download. VI. CONCLUSION In cloud storage system, secure information destruction is one in all the problems that require to be addressed in information security. Many information destruction schemes are projected in recent years. However, there are still some limitations. In this paper, we principally concentrate on the ciphertext destruction and propose a secure ciphertext self- destruction scheme with attribute-based encryption known as SCSD that applies the attribute-based encryption and the distributed hash table technology to the method of knowledge destruction within the cloud storage environment. Compared with the present schemes, our theme will resist the normal cryptanalysis attack as well because the Sybil attacks within the DHT network. Besides, the performance of SCSD scheme is comparatively effective and efficient. REFERENCES [1] B. Wang, B. Li, and H. Li, “Oruta: Privacy-preserving public auditingfor shared data in the cloud,” Cloud Computing, IEEE Transactions on, vol. 2, no. 1, pp. 43– 56, 2014. [2] J. Xiong, Z. Yao, J. Ma, X. Liu, Q. Li, and J. Ma, “Priam: Privacy preserving identity and access management scheme in cloud,” KSII Transactions on Internet and Information Systems (TIIS), vol. 8, no. 1, pp. 282–304, 2014. [3] J. Xiong, F. Li, J. Ma, X. Liu, Z. Yao, and P. S. Chen, “A full lifecycle privacy protection scheme for sensitive data in cloud computing,” Peerto-Peer Networking and Applications. [Online]. Available: http://dx.doi.org/10.1007/s12083-014-0295-x [4] P. Jamshidi, A. Ahmad, and C. Pahl, “Cloud migration research: A systematic review,” Cloud Computing, IEEE Transactions on, vol. 1, no. 2, pp. 142–157, 2013. [5] R. Lu, H. Zhu, X. Liu, J. K. Liu, and J. Shao, “Toward efficient and privacy-preserving computing in big data era,” Network, IEEE, vol. 28, no. 4, pp. 46–50, 2014. [6] X. Liu, J. Ma, J. Xiong, and G. Liu, “Ciphertext-policy hierarchical attribute-based encryption for fine- grained access control of encryption data,” International Journal of Network Security, vol. 16, no. 4, pp. 351–357, 2014. [7] Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology–EUROCRYPT 2005, ser. LNCS, vol. 7371. Springer, 2005, pp. 457–473. [8] Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute- based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM conference on Computer and Communications Security. ACM, 2006, pp. 89–98. [9] F. Chan and I. F. Blake, “Scalable, server-passive, useranonymous timed release cryptography,” in Proceedings of the International Conference on Distributed Computing Systems. IEEE, 2005, pp. 504– 513. [10]K. G. Paterson and E. A. Quaglia, “Time-specific encryption,” in Security and Cryptography for Networks. Springer, 2010, pp. 1–16. [11]Q. Li, J. Ma, R. Li, J. Xiong, and X. Liu, “Large universe decentralized key-policy attribute-based encryption,” Security and Communication Networks, 2014. [Online]. Available: http://dx.doi.org/10.1002/sec.997 [12]J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proceedings of the 28th IEEE Symposium on Security and Privacy. IEEE, 2007, pp. 321– 334. [13] L. Cheung and C. C. Newport, “Provably secure ciphertext policy abe,” in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 456– 465. [14] Waters, “Cipher text - policy attribute - based encryption: An expressive, efficient, and provably secure realization,” Public Key Cryptography–PKC 2011, pp. 53–70, 2011. [15]Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.