cs 17(10): e4

Research Article

Extensible and fine-grained characteristics-positioned information storage in cloud computing

Download943 downloads
  • @ARTICLE{10.4108/eai.20-12-2017.154376,
        author={M. IYAPPARAJA and C. NAVANEETHAN and S. MEENATCHI},
        title={Extensible and fine-grained characteristics-positioned information storage in cloud computing},
        journal={EAI Endorsed Transactions on Cloud Systems},
        volume={3},
        number={10},
        publisher={EAI},
        journal_a={CS},
        year={2017},
        month={12},
        keywords={Distributed computing, cipher-text attribute-based encryption, Data owner, cloud server},
        doi={10.4108/eai.20-12-2017.154376}
    }
    
  • M. IYAPPARAJA
    C. NAVANEETHAN
    S. MEENATCHI
    Year: 2017
    Extensible and fine-grained characteristics-positioned information storage in cloud computing
    CS
    EAI
    DOI: 10.4108/eai.20-12-2017.154376
M. IYAPPARAJA1,*, C. NAVANEETHAN1, S. MEENATCHI1
  • 1: SITE School, VIT, Vellore, TamilNadu-632014
*Contact email: iyapparaja.m@vit.ac.in

Abstract

With the improvement of distributed computing, outsourcing information to cloud server pulls in loads of considerations. To ensure the security and accomplish adaptable fine-grained record access control, (ABE) was proposed and utilized as a part of distributed storage framework. Be that as it may, client repudiation is the essential issue in ABE plans. In this article, we give a cipher text-arrangement trait-based encryption (CP-ABE) plan with effective client repudiation for distributed storage framework. The issue of client repudiation can be explained productively by presenting the idea of client gathering. At the point when any client leaves, the gathering supervisor will redesign client’s PK with the exception of the individuals, who have been declined. Also, CP-ABE plan has substantial calculation cost, as it becomes straightly with the intricacy for the entrance structure. To diminish the calculation cost, we outsource high calculation burden to cloud administration suppliers without spilling document substance and mystery keys. Notably, our plan can withstand conspiracy assault performed by denied clients collaborating with existing clients.