Skip to main content

A Novel Approach to View and Modify Data in Cloud Environment Using Attribute-Based Encryption

  • Conference paper
  • First Online:
Inventive Communication and Computational Technologies

Abstract

The Big data and cloud integration is a challenging Task. To enhance the data security issues, ABE can be deployed. In proposed model, a improved concept has been implemented and the integration of cloud and Big data is achieved. Security is the major threat for cloud computing applications. Every user has to feed user name, password, and primary key for Data access into the cloud data center. Data owner generates a new key to the users for accessing the data. Policy updating is also implemented in the proposed system, that is the accountability for the data access has also been implemented. In case of the change of policy, the altered data stored in the cloud is not affected. In addition to that, admin generates policy key based on the user’s profile. If any user tries to misbehave, an immediate alert is sent to the data owner. Data owner can change the policy key and access policy in the run time. Our system should be able to update its policy automatically.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Goyal V, Pandey O, Sahai A (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: CCS’06. ACM, pp 89–98

    Google Scholar 

  2. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: S&P’07. IEEE, pp 321–334

    Google Scholar 

  3. Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: PKC’11. Springer, pp 53–70

    Google Scholar 

  4. Lewko AB, Okamoto T, Sahai A (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: EUROCRYPT’10. Springer, pp 62–91

    Google Scholar 

  5. Lewko AB, Waters B (2011) Decentralizing attribute-based encryption. In: EUROCRYPT’11. Springer, pp 568–588

    Google Scholar 

  6. Yu S, Wang C, Ren K et al (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM’10. IEEE, pp 534–542

    Google Scholar 

  7. Yang K, Jia X, Ren K (2013) Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: AsiaCCS’13. ACM, pp 523–528

    Google Scholar 

  8. Yang K, Jia X, Ren K, Zhang B, Xie R (2013) DAC-MACS: Effective data access control for multiauthority cloud storage systems. IEEE Trans Info Forensics Secur 8(11):1790–1801

    Article  Google Scholar 

  9. Yang K, Jia X (2014) Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans Parallel Distrib Syst 25(7):1735–1744

    Article  Google Scholar 

  10. Sahai A, Seyalioglu H, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: CRYPTO’12. Springer, pp 199–217

    Google Scholar 

  11. Subbiah S, Selvamuthukumaran S, Ramkumar T (2015) An approach for enhancing secure cloud storage using vertical partitioning algorithm. Middle-East J Sci Res 23(2):223–230. ISSN:1990-9233

    Google Scholar 

  12. Subbiah S, Selvamuthukumaran S (2015) Distributed data security for data prevention in cloud computing using one time password for user authentication. J Environ Sci Comput Sci Eng Technol 4(4):752–758. E-ISSN: 2278-179X

    Google Scholar 

  13. Roshan, MR, Kumar, MS, Magesh S, Palaniappan S (2017) Forwarding secured data in cloud interface systems. Int J Pure Appl Math 116(23):179–183

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Swaminathan Subbiah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Subbiah, S., Palaniappan, S., Ashokkumar, S., BalaSundaram, A. (2020). A Novel Approach to View and Modify Data in Cloud Environment Using Attribute-Based Encryption. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 89. Springer, Singapore. https://doi.org/10.1007/978-981-15-0146-3_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0146-3_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0145-6

  • Online ISBN: 978-981-15-0146-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics