Abstract
The Big data and cloud integration is a challenging Task. To enhance the data security issues, ABE can be deployed. In proposed model, a improved concept has been implemented and the integration of cloud and Big data is achieved. Security is the major threat for cloud computing applications. Every user has to feed user name, password, and primary key for Data access into the cloud data center. Data owner generates a new key to the users for accessing the data. Policy updating is also implemented in the proposed system, that is the accountability for the data access has also been implemented. In case of the change of policy, the altered data stored in the cloud is not affected. In addition to that, admin generates policy key based on the user’s profile. If any user tries to misbehave, an immediate alert is sent to the data owner. Data owner can change the policy key and access policy in the run time. Our system should be able to update its policy automatically.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Goyal V, Pandey O, Sahai A (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: CCS’06. ACM, pp 89–98
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: S&P’07. IEEE, pp 321–334
Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: PKC’11. Springer, pp 53–70
Lewko AB, Okamoto T, Sahai A (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: EUROCRYPT’10. Springer, pp 62–91
Lewko AB, Waters B (2011) Decentralizing attribute-based encryption. In: EUROCRYPT’11. Springer, pp 568–588
Yu S, Wang C, Ren K et al (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM’10. IEEE, pp 534–542
Yang K, Jia X, Ren K (2013) Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: AsiaCCS’13. ACM, pp 523–528
Yang K, Jia X, Ren K, Zhang B, Xie R (2013) DAC-MACS: Effective data access control for multiauthority cloud storage systems. IEEE Trans Info Forensics Secur 8(11):1790–1801
Yang K, Jia X (2014) Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans Parallel Distrib Syst 25(7):1735–1744
Sahai A, Seyalioglu H, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: CRYPTO’12. Springer, pp 199–217
Subbiah S, Selvamuthukumaran S, Ramkumar T (2015) An approach for enhancing secure cloud storage using vertical partitioning algorithm. Middle-East J Sci Res 23(2):223–230. ISSN:1990-9233
Subbiah S, Selvamuthukumaran S (2015) Distributed data security for data prevention in cloud computing using one time password for user authentication. J Environ Sci Comput Sci Eng Technol 4(4):752–758. E-ISSN: 2278-179X
Roshan, MR, Kumar, MS, Magesh S, Palaniappan S (2017) Forwarding secured data in cloud interface systems. Int J Pure Appl Math 116(23):179–183
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Subbiah, S., Palaniappan, S., Ashokkumar, S., BalaSundaram, A. (2020). A Novel Approach to View and Modify Data in Cloud Environment Using Attribute-Based Encryption. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 89. Springer, Singapore. https://doi.org/10.1007/978-981-15-0146-3_20
Download citation
DOI: https://doi.org/10.1007/978-981-15-0146-3_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0145-6
Online ISBN: 978-981-15-0146-3
eBook Packages: EngineeringEngineering (R0)