Skip to main content

Secure Public Cloud Storage Using Collobrative Access Control and Privacy Aware Data Deduplication

  • Conference paper
  • First Online:
Artificial Intelligence Techniques for Advanced Computing Applications

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 130))

  • 660 Accesses

Abstract

Attribute Based Encryption (ABE) proved to be a powerful tool of cryptography able to express more quality access policies, which can provide fine-grained control, adaptable, and secure access to the data outsourcing. In any case, existing ABE-based access control plans don’t back clients to pick up the access authorization by collaboration, In this paper, Explore the attribute-based access control in situations where a lot of users who have the qualities typical set can collaborate to gain access authorization if the owner of the data enable their collaboration in getting the policy. Meanwhile, collaboration is not defined in getting to the approach should be esteem as collusion and get to ask would be rejected. Propose collaborative access control attribute-based flow control by assigning a translation hub in the access structure. Then create ZEUS and ZEUS +, indicates the aware of two privacy with the deduplication protocols, the guarantees with the weaker protection in productive communication cost, ZEUS + provides the stronger safety profile with the cost communication costs increases. This is the high priority way to security addresses two sides with one or the other does not utilize additional hardware or depending on the parameters chosen heuristics used by existing solutions, in this way reducing the cost and complexity of cloud storage.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Buyya R, Yeo CS, Venugopal S, Broberg J, Bandic (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616

    Google Scholar 

  2. Hough A (2010) Google engineer fired for privacy breach after staking and harassing teenagers. The telegraph

    Google Scholar 

  3. Yang JF, Chen ZB (2010) Cloud computing research and security issues. In: 2010 IEEE international conference on computational intelligence and software engineering (CiSE), Wuhan, pp 1–3

    Google Scholar 

  4. Kaur PJ, Kaushal K (2011) Security concerns in cloud computing. In: Accepted for international conference on high performance architecture and grid computing

    Google Scholar 

  5. Guo R, Wen Q, Shi H, Jin Z, Zhang H (2014) Certificateless public key encryption scheme with hybrid problems and its application to internet of things. Math Probl Eng 2014

    Google Scholar 

  6. Al-Riyami S, Paterson K (2003) Certificate less public key cryptography. In: Proceedings of ASIACRYPT, Springer, LNCS 2894, pp 452–473

    Google Scholar 

  7. Yuen TH, Zhang Y, Yiu SM, Liu JK (2014) Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks. In: Proceedings of 19th ESORICS, vol. 8712, pp 130–147

    Google Scholar 

  8. Liang K, Liu JK, Wong DS, Susilo W (2014) An efficient cloud-based revocable identity based proxy re-encryption scheme for public clouds data sharing, vol. 8712, pp 257–272

    Google Scholar 

  9. Takabi H, Joshi JBD (2010) Security and privacy challenges in cloud computing environment. IEEE J Secur Priv 8(6)

    Google Scholar 

  10. Naveen Chandar B, Arivazhagan N, Venkatesh K (2019) Improving the network performance using MP-OLSR protocol for wireless ad hoc network (MANET). Int J Recent Technol Eng 8(3):5700–5707

    Google Scholar 

  11. Vakaavinash V, Venkatesh K (2020) Role of software-defined network in industry 4.0”. In: EAI/springer innovations in communication and computing-internet of things for industry 4.0 design, challenges and solutions, pp 197–218

    Google Scholar 

  12. Venkatesh K, Srinivas LNB, Mukesh Krishnan MB, Shanthini A (2018) QoS improvisation of delay sensitive communication using SDN based multipath routing for medical applications. Future Gener Comput Syst 93(2019):256–265

    Google Scholar 

  13. Jiang T, Chen X, Li J, Wong DS, Ma J, Liu J (2014) TIMER: secure and reliable cloud storage against data re-outsourcing. In: Proceedings of 10th international conference information security practice and experience, vol. 8434, pp 346–358

    Google Scholar 

  14. Yang J, Chen Z (2010) Cloud computing research and security issues. In: The proceeding of IEEE international conference on computational intelligence and software engineering, pp 1–3

    Google Scholar 

  15. Hohenberger S, Waters B (2014) Online/offline attribute-based encryption. In: Proceedings of the 17th international conference on practice and theory in public-key cryptography (PKC). Springer, pp 293–310

    Google Scholar 

  16. Lenstra AK, Hughes JP, Augier M, Bos JW, Kleinjung T, Wachter (2012) “Public keys”, volume 7417 of LNCS. Springer, pages 626–642

    Google Scholar 

  17. Michaelis K, Meyer C, Schwenk J (2013) Randomly failed the state of randomness in current java implementations, volume 7779 of LNCS. Springer, pages 129–144

    Google Scholar 

  18. Rifki S, Park Y, Moon S (2015) A fully secure cipher text-policy attribute-based encryption with a tree-based access structure, pp 247–265

    Google Scholar 

  19. Yang Y, Liu JK, Liang K, Choo K-KR, Zhou J (2015) Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. In: Proceedings of 20th ESORICS, vol. 9327, pp 146–166

    Google Scholar 

  20. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of the 28th IEEE symposium on security and privacy (Oak-land). IEEE, pp 321–334

    Google Scholar 

  21. Liang K et al (2014) A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Trans Inf Forensics Secur 9(10):1667–1680

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. M. Karthik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aarthi, A., Karthik, G.M., Sayeekumar, M. (2021). Secure Public Cloud Storage Using Collobrative Access Control and Privacy Aware Data Deduplication. In: Hemanth, D., Vadivu, G., Sangeetha, M., Balas, V. (eds) Artificial Intelligence Techniques for Advanced Computing Applications. Lecture Notes in Networks and Systems, vol 130. Springer, Singapore. https://doi.org/10.1007/978-981-15-5329-5_21

Download citation

Publish with us

Policies and ethics