A Survey Report on Attribute Based Encryption Methodologies to Secure Cloud Storage

Page 1

IJIRST –International Journal for Innovative Research in Science & Technology| Volume 3 | Issue 10 | March 2017 ISSN (online): 2349-6010

A Survey Report on Attribute Based Encryption Methodologies to Secure Cloud Storage Sadanand H Bhuse ME Student Department of Computer Engineering Sinhgad Academy of Engineering Pune

Santosh N Shelke Assistant Professor Department of Computer Engineering Sinhgad Academy of Engineering Pune

Abstract Due to reliability, there are millions of the uses of the cloud storages. So clouds are widely developing field for various purposes. Many cloud hosts are providing services to different clients for their data. Due to disaster management cloud can be used as trustworthy storage mechanism. For such cloud storages encryption is done many a ways for securing data. The attribute based encryption is the method to encrypt the contents. This paper discusses the attribute based encryption method for the cloud storages. The method is also used to hide identity of the user that means the anonymous authentication can be implemented only by use of attributes. Keywords: Attributes, Encryption, Anonymity, Authentication _______________________________________________________________________________________________________ I.

INTRODUCTION

Cloud is the storage mechanism for various electronic data such as databases, Software, Platforms, communication services, Commercial data storages etc. The security is also a big issue for the contents in the storage at cloud. Various encryption mechanisms are used to protect data from unauthorized access as well as from the losses, attacks etc. There are methods used such as public key infrastructure, Identity based encryption as well as fuzzy identity based encryption method. The attribute based encryption is also a method to encrypt the contents by using attributes only. This paper contents few of these methods to secure cloud storage by using attribute based authentication. Many sensitive data can be secured by using this mechanism. For the same, we may achieve the anonymous authentication. II. ACCESS CONTROL AND ENCRYPTION FOR AUTHENTICATION The Encryption process is required to maintain security of the data, and also to control the access over the storage for specific users. Generally the access control can be Identity Based Access Control, Role Based Access Control or Attribute Based Access Control [2]. .

Fig. 1: Identity Based Access Control

All rights reserved by www.ijirst.org

227


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.