DocumentCode
649892
Title
Empowered service delegation with attribute encryption for distributed cloud computing
Author
Aravinth, S.S. ; Ramkumar, M. ; Rajkumar, B. ; Anitha, M. ; Elangodi, S.
Author_Institution
Dept. of Comput. Sci. & Eng., Knowledge Inst. of Technol., India
fYear
2013
fDate
3-3 July 2013
Firstpage
110
Lastpage
113
Abstract
Cloud computing has emerged as one of the most influential paradigms in the IT industry. In this, new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. Several schemes employing attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing. The most[1][2] of them suffer from inflexibility in implementing complex access control policies. In this paper, allowing cloud service providers (CSPs), which are not in the same trusted domains as enterprise users, to take care of confidential data, may raise potential security and privacy issues. To keep the sensitive user data confidential against untrusted CSPs, a Natural way is to apply cryptographic approaches, by disclosing Decryption keys only to authorized users. But also provide full delegation, and scalability, so as to best serve the needs of accessing data anytime and anywhere, delegating within enterprises, and achieving a dynamic set of users. [3][4]HASBE employs multiple value assignments for access expiration time to deal with user revocation more efficiently than existing schemes. It can be providefine-grained access control and full delegation. Finally, we propose a scalable revocation scheme by delegating to the CSP most of the computing tasks in revocation, to achieve a dynamic set of users efficiently.
Keywords
authorisation; cloud computing; cryptography; data privacy; outsourcing; ABE; HASBE scheme; IT industry; attribute-based encryption; authorized users; cloud service providers; computing tasks; confidential data; cryptographic approaches; data access expiration time; decryption keys; distributed cloud computing; fine-grained access control; multiple value assignments; outsourced data privacy; outsourced data security; scalable revocation scheme; service delegation; trusted domains; untrusted CSP; fine grained access control; flexibility; scalability; service delegation;
fLanguage
English
Publisher
ieee
Conference_Titel
Current Trends in Engineering and Technology (ICCTET), 2013 International Conference on
Conference_Location
Coimbatore
Print_ISBN
978-1-4799-2583-4
Type
conf
DOI
10.1109/ICCTET.2013.6675922
Filename
6675922
Link To Document