Username   Password       Forgot your password?  Forgot your username? 

 

Dynamic Access Control of Encrypted Data in  Cloud Computing Environment

Volume 15, Number 3, March 2019, pp. 969-976
DOI: 10.23940/ijpe.19.03.p26.969976

Shuaiqiu Xiang and Zhenjia Zhu

Shenzhen Institute of Information Technology, Shenzhen, 518000, China

(Submitted on November 3, 2018; Revised on December 1, 2018; Accepted on January 2, 2019)

Abstract:

The confidentiality of data is a difficult problem in a cloud computing environment. The DAC technique (Dynamic Access Control) based on encrypted data is an important way to solve this problem. In the current access control techniques based on encrypted data, the high-security requirement of data and frequent policy updates lead to the high cost of owner right update which seriously restricts the flexibility of access control. A DCA method based on CACDP encrypted data is proposed. The selective encryption model is built. In the model, a key derivation diagram is generated to distribute the key. In the case of ensuring the confidentiality of cloud computing access control, the key is less in the system. The proposed CACDP scheme includes the key management mechanism based on the binary Trie tree. Based on this, the ELGamal-based proxy re-encryption mechanism and double layer encryption strategy are used to transfer the partial spending of the key and data update to the cloud to ease the DO authority management burden and increase the efficiency of DO. Then, the DCA method of encrypted data in cloud computing environment is researched. Experimental results show that our proposed method can effectively improve the flexibility of encrypted data access control.

 

References: 13

        1. F. I. K. Mousa, N. Al Maadeed, K. Busawon, A. Bouridane, and R. Binns, “Secure MIMO Visible Light Communication System based on User’s Location and Encryption,” Journal of Lightwave Technology, Vol. 35, pp. 5324-5334, 2017
        2. F. Guo and T. Cheng, “Systems and Methods for Detecting Suspicious Attempts to Access Data based on Organizational Relationships,” Google Patents, 2015
        3. M. Kumar, S. Verma, and K. Lata, “Secure Data Aggregation in Wireless Sensor Networks using Homomorphic Encryption,” International Journal of Electronics, Vol. 102, pp. 690-702, 2015
        4. A. Argyris, E. Pikasis, and D. Syvridis, “Gb/s One-Time-Pad Data Encryption with Synchronized Chaos-based True Random Bit Generators,” Journal of Lightwave Technology, Vol. 34, pp. 5325-5331, 2016
        5. Z. Pan, S. Liu, and W. Fu, “A Review of Visual Moving Target Tracking,” Multimedia Tools & Applications, Vol. 76, pp. 16989-17018, 2017
        6. H. Chen, X. Du, and Z. Liu, “Optical Hyperspectral Data Encryption in Spectrum Domain by using 3D Arnold and Gyrator Transforms,” Spectroscopy Letters, Vol. 49, pp. 103-107, 2016
        7. B. Cui, Z. Liu, and L. Wang, “Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage,” IEEE Transactions on Computers, Vol. 65, pp. 2374-2385, 2016
        8. S. Liu, W. Fu, W. Zhao, J. Zhou, and Q. Li, “A Novel Fusion Method by Static and Moving Facial Capture,” Mathematical Problems in Engineering, Vol. 2013, pp. 503924, 2013
        9. M. Du and G. Hao, “DR-PRO: Cloud-Storage Privilege Revoking Optimization Mechanism based on Dynamic Re-Encryption,” Journal of Computer Applications, Vol. 7, pp. 20, 2015
        10. G. Wang, Q. Liu, and J. Wu, “Hierarchical Attribute-based Encryption for Fine-Grained Access Control in Cloud Storage Services,” in Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 735-737, 2010
        11. G. Liang, “Big Data Encryption to Protect Privacy Data Environment Improvement and Simulation of the Algorithm,” Computer Simulation, Vol. 33, pp. 338-341, 2016
        12. Y. Tian, Y. Peng, X. Peng, and H. Li, “An Attribute-based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks,” International Journal of Distributed Sensor Networks, Vol. 10, pp. 259798, 2014
        13. S. Liu, W. Fu, H. Deng, C. Lan, and J. Zhou, “Distributional Fractal Creating Algorithm in Parallel Environment,” International Journal of Distributed Sensor Networks, Vol. 9, pp. 281707, 2013

         

        Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

         
        This site uses encryption for transmitting your passwords. ratmilwebsolutions.com