Flexible Data Access Control using Attribute-Based Encryption and Proxy Re-Encryption in Cloud Computing

Authors

  • Manoj Kumar D S
  • S. Venkatesan, A Ramachandran

Keywords:

Attribute-based encryption, cloud data, encryption, proxy re-encryption, reputation model

Abstract

In the fast-paced business world of today, the adoption of the latest technological advances is essential for sustainability and growth. One such area of technology where more and more businesses are taking advantage of is the cloud, which allows data to be stored remotely on servers across the world. Cloud storage also gives companies greater flexibility with their data and information, as it can be accessed anywhere and anytime, which can be especially helpful for businesses that operate in many countries. Despite all the advantages, due to problems such as lack of standardization, there are unfortunately some drawbacks and security issues that can arise from using cloud computing and SaaS services (Software-as-a-service). Controlling private and delicate data on the cloud is becoming a serious issue. In this work to ensure integrity and authenticity, the proposed model which is capable of providing data access control to the cloud data. Trust plays a vital role in data sharing among the users of the cloud. This work powerfully handles data access in cloud computing focused on trust assessed by the data owner or reputations produced by several reputations center’s flexibly by relating Attribute-Based Encryption and Proxy-based Re-Encryption. Context-aware trust and reputation assessment are used to support various control scenarios and strategies.

Published

2020-03-23

Issue

Section

Articles