Re Encryption In Deceivable Clouds Computer Science Essay

Published:

Securing cloud computing data is achieved by the data owner by storing the encrypted data in the cloud and by issuing decryption keys to authorized user. The accessation of the data is completed by issuing re-encryption commands to the cloud to re-encrypt the data for the prevention of the revoked user from decrypting the data and to generate new decryption keys to authorized users. Unreliable network communications may cause a threat, because a cloud computing environment is comprised of many cloud servers and such commands may not be received and executed by all the clod servers. A new encryption scheme called attribute based encryption is used to build and achieve our solution. This allows fine-grain access control and does not require perfect clock synchronization for correctness.

INTRODUCTION

Cloud computing is a relatively new domain that is receiving sparkling attention from young aspirants for renowned publications and home-users, the striking feature of cloud computing is that it can be of prime importance in providing subscription based services for network storage space and computer resources.

Lady using a tablet
Lady using a tablet

Professional

Essay Writers

Lady Using Tablet

Get your grade
or your money back

using our Essay Writing Service!

Essay Writing Service

Securing cloud computing data is achieved by the data owner by storing the encrypted data in the cloud and by issuing the decryption keys to authorized user. The accessation of the data is completed by issuing re-encryption commands to the cloud to re-encrypt the data for the prevention of the revoked user from decrypting the data and to generate new decryption keys to authorized users. Unreliable network communications may cause a threat, because a cloud computing environment is comprised of many cloud servers and such commands may not be received and executed by all the clod servers. A new encryption scheme called attribute based encryption is used to build and achieve our solution. This allows fine-grain access control and does not require perfect clock synchronization for correctness. It is built on top of a new encryption scheme, attributebased encryption, to allow fine-grain access control, and does not require perfect clock synchronization for correctness. Fine-grained access control systems facilitate granting differential access rights to a set of users and allow flexibility in specifying the access rights of individual users. The primary difference between attribute based encryption[3]â€"[5] and secret-sharing schemes is that while secret-sharing schemes allow for cooperation between different parties, in attribute based encryption, this is expressly forbidden.

RELATED WORK

The key problem of storing encrypted data in the cloud lies in revoking access rights from users. Users are revoked by having a third party to re-encrypt data such that previous keys can no longer decrypt any data [14],[15],[16]. The solution by [15] for instance, lets the data owner issue a re-encryption key to an untrusted server to re-encrypt the data. Their solution utilizes PRE [6], which allows the server to re-encrypt the stored ciphertext to a different cipertext that can only be decrypted using a different key. During the process, the server does not learn the contents of the cipertext or the decryption keys. ABE is a new cryptographic technique that efficiently supports fine grained access control. The combination of PRE and ABE was first introduced by [9], and extended by [8], [17]. In [8], a hierarchical attribute-based encryption (HABE) scheme is proposed to achieve high performance and full delegation. In this a naive solution is to let the data owner immediately re-encrypt the data, so that the revoked users cannot decrypt the data using their old keys, while distributing the new keys to the remaining authorized users. This solution will lead to a performance bottleneck, especially when there are frequent user revocations. An alternative solution is to apply the proxy re-encryption (PRE) [6], [7]. technique. This approach takes advantage of the abundant resources in a cloud by delegating the cloud to re-encrypt data[8],[9]. This approach is also called command-driven re-encryption scheme, where cloud servers execute re-encryption while receiving commands from the data owner. However, command-driven re-encryption schemes do not consider the underlying system architecture of the cloud environment. A cloud is essentially a large scale distributed system where a data owner’s data is replicated over multiple servers for high availability. As a distributed system, the cloud will experience failures common to such systems, such as server crashes and network outages. As a result, re-encryption commands sent by the data owner may not propagate to all of the servers in a timely fashion, thus creating security risks.

Lady using a tablet
Lady using a tablet

Comprehensive

Writing Services

Lady Using Tablet

Plagiarism-free
Always on Time

Marked to Standard

Order Now

PROPOSED SYSTEM:

We propose a reliable re-encryption scheme in unreliable clouds (R3 scheme for short). R3 is a time-based re-encryption scheme, which allows each cloud server to automatically re-encrypt data based on its internal clock. The basic idea of the R3 scheme is to associate the data with an access control and an access time. Each user is issued keys associated with attributes and attribute effective times. The data can be decrypted by the users using the keys with attributes satisfying the access control, and attribute effective times satisfying the access time.