Abstract

Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.

Highlights

  • Cloud computing is an emerging field, since its inception, cloud computing gained widespread popularity in the industry as well as academia [1]

  • An Example of ciphertext policy – Attribute-based encryption (CP-Attribute-based encryption (ABE)) encryption is given in Figure 2, CP-ABE uses tree-based structure with a given set of attribute, in order to decrypt the data, attribute set must satisfy access structure which is associated with the data, it uses AND, OR and k of n operator to specify which attribute set(User) can decrypt the data. for example if the data is encrypted under the following attribute set and the access tree given in the Figure 2 is associated with the data and the different user group can be identified as User1: Manager,a2,a3 user2: accountant,a1 user3: clerk,a1,a3 etc

  • In this protocol fine-grained data access control is achieved, it uses CP- ABE and Geo-encryption for this, the data D is first encrypted with symmetric key Ksec and XOR value of Location lock L and Symmetric key is encrypted with the CP-ABE scheme

Read more

Summary

INTRODUCTION

Cloud computing is an emerging field, since its inception, cloud computing gained widespread popularity in the industry as well as academia [1] It offers many benefits which include the reduced cost on technical support for data backups, saving electric power and maintenance cost. To achieve secure access control of outsourced data Cipher PolicyAttribute based encryption can be used, in which the users which pose only certain attribute and satisfy the access structure associated with the data can access the data. Integrity along with the access control, we purposed to use symmetric key cryptography, Ciphertext-Attribute Based Encryption, Geo Encryption, and MAC.

CLOUD COMPUTING
Characteristics of cloud computing
Three Service Models
Four deployments Model
Security Challenges
CRYPTOGRAPHY
Symmetric encryption
Ciphertext-Policy attribute-based encryption
Geo- Encryption
RELATED WORKS
PURPOSED MODEL
SECURITY DISCUSSIONS
Access control
Confidentiality of the data
The integrity of the data
Availability of the Data
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call