Data Security in cloud computing using Hierarchical CP-ABE scheme with scalability and flexibility
Title | Data Security in cloud computing using Hierarchical CP-ABE scheme with scalability and flexibility |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Shelke, Vishakha M., Kenny, John |
Conference Name | 2018 International Conference on Smart City and Emerging Technology (ICSCET) |
Date Published | Jan. 2018 |
Publisher | IEEE |
ISBN Number | 978-1-5386-1185-2 |
Keywords | Attribute key, authorisation, Authorization, authorization mechanisms, Cipher Text Policy-Attribute Based Encryption (CP-ABE), CipherText Policy Attribute Based Encryption, cloud computing, cloud service provider, Collaboration, CP-ABE, cryptography, Data security, Encryption, fine grained access control, Hierarchical CP-ABE, hierarchical CP-ABE scheme, key policy attribute based encryption, KP-ABE, Organizations, policy-based governance, pubcrawl, quality of service, Scalability, scalable access control, SQL Injection, SQL injection attack |
Abstract | Cloud computing has a major role in the development of commercial systems. It enables companies like Microsoft, Amazon, IBM and Google to deliver their services on a large scale to its users. A cloud service provider manages cloud computing based services and applications. For any organization a cloud service provider (CSP) is an entity which works within it. So it suffers from vulnerabilities associated with organization, including internal and external attacks. So its challenge to organization to secure a cloud service provider while providing quality of service. Attribute based encryption can be used to provide data security with Key policy attribute based encryption (KP-ABE) or ciphertext policy attribute based encryption (CP-ABE). But these schemes has lack of scalability and flexibility. Hierarchical CP-ABE scheme is proposed here to provide fine grained access control. Data security is achieved using encryption, authentication and authorization mechanisms. Attribute key generation is proposed for implementing authorization of users. The proposed system is prevented by SQL Injection attack. |
URL | https://ieeexplore.ieee.org/document/8537272 |
DOI | 10.1109/ICSCET.2018.8537272 |
Citation Key | shelke_data_2018 |
- fine grained access control
- SQL injection attack
- SQL injection
- scalable access control
- Scalability
- quality of service
- pubcrawl
- policy-based governance
- Organizations
- KP-ABE
- key policy attribute based encryption
- hierarchical CP-ABE scheme
- Hierarchical CP-ABE
- Attribute key
- encryption
- Data Security
- Cryptography
- CP-ABE
- collaboration
- cloud service provider
- Cloud Computing
- CipherText Policy Attribute Based Encryption
- Cipher Text Policy-Attribute Based Encryption (CP-ABE)
- authorization mechanisms
- authorization
- authorisation