Visible to the public Hybrid Access Control for Atoring Large Data with Security

TitleHybrid Access Control for Atoring Large Data with Security
Publication TypeConference Paper
Year of Publication2022
AuthorsBiswas, Ankur, K V, Pradeep, Kumar Pandey, Arvind, Kumar Shukla, Surendra, Raj, Tej, Roy, Abhishek
Conference Name2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)
KeywordsAccess Control, black box encryption, Closed box, cloud computing, cloud storage, composability, Costs, CP-ABE Techniques, data privacy, EDoS attacks, Encrypted Cloud Storage, Encryption, Memory, Metrics, pubcrawl, Resiliency
AbstractAlthough the public cloud is known for its incredible capabilities, consumers cannot totally depend on cloud service providers to keep personal data because to the lack of client maneuverability. To protect privacy, data controllers outsourced encryption keys rather than providing information. Crypt - text to conduct out okay and founder access control and provide the encryption keys with others, innate quality Aes (CP-ABE) may be employed. This, however, falls short of effectively protecting against new dangers. The public cloud was unable to validate if a downloader could decode using a number of older methods. Therefore, these files should be accessible to everyone having access to a data storage. A malicious attacker may download hundreds of files in order to launch Economic Deny of Sustain (EDoS) attacks, greatly depleting the cloud resource. The user of cloud storage is responsible for paying the fee. Additionally, the public cloud serves as both the accountant and the payer of resource consumption costs, without offering data owners any information. Cloud infrastructure storage should assuage these concerns in practice. In this study, we provide a technique for resource accountability and defense against DoS attacks for encrypted cloud storage tanks. It uses black-box CP-ABE techniques and abides by the access policy of CP-arbitrary ABE. After presenting two methods for different parameters, speed and security evaluations are given.
DOI10.1109/IIHC55949.2022.10060094
Citation Keybiswas_hybrid_2022