SECURE AND EFFECTIVE FILE SHARING ON CLOUD
Abstract
Cloud computing is a system whereby data storage, applications and to some degree processing power are freed from local constraints and are available via servers or computers elsewhere in the world. The need for huge local drives is negated, those space-hogging office suites no longer sit on local machines and the option of an extra power boost when needed is within our reach. There are certain problems in Existing cloud computing which is impending the fast growth of cloud computing technology, among them few causes are Data security, Data confidential and Fine-Grained data access. In this paper, we present a way to implement scalable and fine-grained access control systems based on Key Policy attribute-based encryption (KP-ABE). For the purpose of secure access control in cloud computing, the prevention of illegal key sharing among colluding users is missing from the existing access control systems based on KP-ABE. This paper addresses this challenging open issue by defining and enforcing access policies based on data attributes and implementing user accountability by using Proxy re-encryption and Lazy Revocation. Furthermore, both the user grant and revocation are efficiently supported by using the Lazy re-vocation technique. Extensive analysis shows that the proposed scheme is highly efficient and provably secures under existing security models.Downloads
Published
Issue
Section
License
COPYRIGHT AGREEMENT AND AUTHORSHIP RESPONSIBILITY
 All paper submissions must carry the following duly signed by all the authors:
“I certify that I have participated sufficiently in the conception and design of this work and the analysis of the data (wherever applicable), as well as the writing of the manuscript, to take public responsibility for it. I believe the manuscript represents valid work. I have reviewed the final version of the manuscript and approve it for publication. Neither has the manuscript nor one with substantially similar content under my authorship been published nor is being considered for publication elsewhere, except as described in an attachment. Furthermore I attest that I shall produce the data upon which the manuscript is based for examination by the editors or their assignees, if requested.â€