Abstract
Attribute Based Encryption (ABE) proved to be a powerful tool of cryptography able to express more quality access policies, which can provide fine-grained control, adaptable, and secure access to the data outsourcing. In any case, existing ABE-based access control plans don’t back clients to pick up the access authorization by collaboration, In this paper, Explore the attribute-based access control in situations where a lot of users who have the qualities typical set can collaborate to gain access authorization if the owner of the data enable their collaboration in getting the policy. Meanwhile, collaboration is not defined in getting to the approach should be esteem as collusion and get to ask would be rejected. Propose collaborative access control attribute-based flow control by assigning a translation hub in the access structure. Then create ZEUS and ZEUS +, indicates the aware of two privacy with the deduplication protocols, the guarantees with the weaker protection in productive communication cost, ZEUS + provides the stronger safety profile with the cost communication costs increases. This is the high priority way to security addresses two sides with one or the other does not utilize additional hardware or depending on the parameters chosen heuristics used by existing solutions, in this way reducing the cost and complexity of cloud storage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Buyya R, Yeo CS, Venugopal S, Broberg J, Bandic (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616
Hough A (2010) Google engineer fired for privacy breach after staking and harassing teenagers. The telegraph
Yang JF, Chen ZB (2010) Cloud computing research and security issues. In: 2010 IEEE international conference on computational intelligence and software engineering (CiSE), Wuhan, pp 1–3
Kaur PJ, Kaushal K (2011) Security concerns in cloud computing. In: Accepted for international conference on high performance architecture and grid computing
Guo R, Wen Q, Shi H, Jin Z, Zhang H (2014) Certificateless public key encryption scheme with hybrid problems and its application to internet of things. Math Probl Eng 2014
Al-Riyami S, Paterson K (2003) Certificate less public key cryptography. In: Proceedings of ASIACRYPT, Springer, LNCS 2894, pp 452–473
Yuen TH, Zhang Y, Yiu SM, Liu JK (2014) Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks. In: Proceedings of 19th ESORICS, vol. 8712, pp 130–147
Liang K, Liu JK, Wong DS, Susilo W (2014) An efficient cloud-based revocable identity based proxy re-encryption scheme for public clouds data sharing, vol. 8712, pp 257–272
Takabi H, Joshi JBD (2010) Security and privacy challenges in cloud computing environment. IEEE J Secur Priv 8(6)
Naveen Chandar B, Arivazhagan N, Venkatesh K (2019) Improving the network performance using MP-OLSR protocol for wireless ad hoc network (MANET). Int J Recent Technol Eng 8(3):5700–5707
Vakaavinash V, Venkatesh K (2020) Role of software-defined network in industry 4.0”. In: EAI/springer innovations in communication and computing-internet of things for industry 4.0 design, challenges and solutions, pp 197–218
Venkatesh K, Srinivas LNB, Mukesh Krishnan MB, Shanthini A (2018) QoS improvisation of delay sensitive communication using SDN based multipath routing for medical applications. Future Gener Comput Syst 93(2019):256–265
Jiang T, Chen X, Li J, Wong DS, Ma J, Liu J (2014) TIMER: secure and reliable cloud storage against data re-outsourcing. In: Proceedings of 10th international conference information security practice and experience, vol. 8434, pp 346–358
Yang J, Chen Z (2010) Cloud computing research and security issues. In: The proceeding of IEEE international conference on computational intelligence and software engineering, pp 1–3
Hohenberger S, Waters B (2014) Online/offline attribute-based encryption. In: Proceedings of the 17th international conference on practice and theory in public-key cryptography (PKC). Springer, pp 293–310
Lenstra AK, Hughes JP, Augier M, Bos JW, Kleinjung T, Wachter (2012) “Public keys”, volume 7417 of LNCS. Springer, pages 626–642
Michaelis K, Meyer C, Schwenk J (2013) Randomly failed the state of randomness in current java implementations, volume 7779 of LNCS. Springer, pages 129–144
Rifki S, Park Y, Moon S (2015) A fully secure cipher text-policy attribute-based encryption with a tree-based access structure, pp 247–265
Yang Y, Liu JK, Liang K, Choo K-KR, Zhou J (2015) Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. In: Proceedings of 20th ESORICS, vol. 9327, pp 146–166
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of the 28th IEEE symposium on security and privacy (Oak-land). IEEE, pp 321–334
Liang K et al (2014) A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Trans Inf Forensics Secur 9(10):1667–1680
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Aarthi, A., Karthik, G.M., Sayeekumar, M. (2021). Secure Public Cloud Storage Using Collobrative Access Control and Privacy Aware Data Deduplication. In: Hemanth, D., Vadivu, G., Sangeetha, M., Balas, V. (eds) Artificial Intelligence Techniques for Advanced Computing Applications. Lecture Notes in Networks and Systems, vol 130. Springer, Singapore. https://doi.org/10.1007/978-981-15-5329-5_21
Download citation
DOI: https://doi.org/10.1007/978-981-15-5329-5_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5328-8
Online ISBN: 978-981-15-5329-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)