M. Amsaveni, S. Duraisamy, R. Shankar


                   Outsourcing of business, Scientific and engineering data application on the Third party administrative cloud server have been increasing from the past decade. Unfortunately many servers disregard the security requirement which entails serious security concerns. To provide Confidentiality on the shared sensitive data, many cryptographic technique are usually applied in large numbers though it has lead to serious challenges in the cloud storage against data sharing.In this paper, we study on achieving fine grained access control on encrypted cloud data against several kinds of attacks propagating to the cloud servers such as key leakage attack, Cipher text attack by deducing the key for encryption and decryption.  Fine grained access control is employed against encrypted data. In addition to more advantage, the access control mechanism also faces several issues in terms of automatic revocation. In order to handle implication of this study, we plan to propose an Ensemble operator on the Fine grained access control through Time, Location and Profile constrainst on the access policy to the attribute set defined. In this notion, expensive access policy generation for decryption of the cipher text is offloaded to the cloud to some extent. Even obtaining encryption key and decryption key, attacker will not help in decrypting the ciphertext. The proposed notion is used as key encapsulation mechanism to the data outsourced to cloud via third party application. Through extensive analysis on different fine grained access control mechanism on the outsourced data, the ensemble operator model can gain significant performance to highlight the scalability and efficiency. 


Secure Data Sharing Models, Fine Grained Access Control, Key Leakage Attack, Cipher Text Attack, Cloud Computing, Outsourced data Security

Full Text:



W. Yau, R. Phan, S. Heng, B. Goi, “Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester, 2013” in International Journal of Computer Mathematics, ,volume 90, Issue: 2, pp. 2581-2587

C. Wang, Q. Wang, K. Ren, N. Cao, W. Lou, “Toward secure and dependable storage services in cloud computing,” Services Computing, IEEE Transactions on, vol. 5, no. 2, pp. 220–232, 2012.

Y. Zhu, H. Hu, G.-J. Ahn, M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Transactions on Parallel Distributed Systems, vol. 23, no. 12, pp. 2231–2244, 2012.

Y. Dodis, J. Katz, S.Xu,M. Yung, “Key-insulated public key cryptosystems,” in Advances in Cryptology–EUROCRYPT 2002 in Springer, volume.2332 ,pp. 65–82.

B. Libert, J.J.Quisquater, M. Yung, “Parallel key-insulated public key encryption without random oracles,” in Public Key Cryptography 2007, Springer, pp. 298–314.

Baodong Qin, Robert H Deng, Shengli Liu, Siqi Ma” Attribute based encryption with efficient verifiable outsourced decryption” 2015. In IEEE Transactions on Information Forensics and Security, volume.10, issue 7,pp:1384–13935.

Zhiguo Wan, Jun’e Liu, and Robert H Deng. Hasbe: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE transactions on information forensics and security, 7(2):743–754, 2012.

Yanjiang Yang, , Jianyong Zhou. Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data. 2015, In Computer Security - ESORICS 2015, pp 146–166.

Hon Yuen, Joseph K Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou. k-times attribute-based anonymous access control for cloud computing. IEEE Transactions on Computers, 64(9):2595–2608, 2015.

. J.Qian X.Dong,“Fully secure revocable attribute-based encryption”2011,Journal of Shanghai Jiaotong University (Science), vol. 16, pp. 490–496.

Ximeng Liu,Robert H. Deng ,Kim-Kwang Raymond Choo , Jian Weng"An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys"IEEE Transactions on Information Forensics and Security in Volume: 11, Issue: 11, Nov. 2016

. Jia Yu, Kui Ren, Cong Wang,Vijay Varadharajan "Enabling Cloud Storage Auditing With Key-Exposure Resistance" IEEE Transactions on Information Forensics and Security in Volume: 10, Issue: 6, June 2015



  • There are currently no refbacks.

Copyright (c) 2018 International Journal of Advanced Research in Computer Science