Visible to the public Improving Privacy and Security with Fine Grained Access Control Policy using Two Stage Encryption with Partial Shuffling in Cloud

TitleImproving Privacy and Security with Fine Grained Access Control Policy using Two Stage Encryption with Partial Shuffling in Cloud
Publication TypeConference Paper
Year of Publication2018
AuthorsChennam, KrishnaKeerthi, Muddana, Lakshmi
Conference Name2018 3rd IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT)
Date PublishedMay 2018
PublisherIEEE
ISBN Number978-1-5386-2440-1
KeywordsAccess Control, access control model, AES, authentication, authorisation, Cipher Text Policy-Attribute Based Encryption (CP-ABE), cipher text-ABE, Ciphers, cloud computing, cloud data, cloud partial shuffling, Collaboration, computer access, CP-ABE, cryptography, data privacy, Data security, Encryption, fine grained access control policy, key policy-ABE, KP-ABE, Multi Stage encryption, outsourcing, policy-based governance, privacy improvement, pubcrawl, Scalability, security, Servers, two stage encryption
Abstract

In a computer world, to identify anyone by doing a job or to authenticate by checking their identification and give access to computer. Access Control model comes in to picture when require to grant the permissions to individual and complete the duties. The access control models cannot give complete security when dealing with cloud computing area, where access control model failed to handle the attributes which are requisite to inhibit access based on time and location. When the data outsourced in the cloud, the information holders expect the security and confidentiality for their outsourced data. The data will be encrypted before outsourcing on cloud, still they want control on data in cloud server, where simple encryption is not a complete solution. To irradiate these issues, unlike access control models proposed Attribute Based Encryption standards (ABE). In ABE schemes there are different types like Key Policy-ABE (KP-ABE), Cipher Text-ABE (CP-ABE) and so on. The proposed method applied the access control policy of CP-ABE with Advanced Encryption Standard and used elliptic curve for key generation by using multi stage encryption which divides the users into two domains, public and private domains and shuffling the data base records to protect from inference attacks.

URLhttps://ieeexplore.ieee.org/document/9012434
DOI10.1109/RTEICT42901.2018.9012434
Citation Keychennam_improving_2018