Abstract
This paper studies block chain and proxy re-encryption methods in our system. Block chain provides transparent property and serves privacy and confidentiality to the system. The storage of block chain can be a barrier for implementing the records in the system. Moreover, it is difficult to store the large amount of data exceeding into the practical storage capabilities of the current block chain usages. The most important issues of block chain are the performance, limited storage, privacy, energy consumption and scalability. Using normal public-key encryption, User A (data owner) needs to download and decrypt the requested data and then re-encrypts data using the target user’s public key. This process requires extra computation cost and communication to the data. Another solution for this is to allow data owners to define access policies and encrypt the data with encryption under the access policies; only authenticated users whose keys are matching their policies can decrypt the ciphertext. But the thing is here data owner needs to download, decrypt, and re-encrypt the requested data in case data access policies change dynamically and frequently. To overcome these drawbacks, in this paper our system proposed a proxy re-encryption scheme that gives solutions for securing data and sharing in cloud computing environment. This system will reduce communication cost and extra computational cost.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jin Ho P, Hyuk P (2017) Blockchain security in cloud computing: use cases, challenges, and solutions. Symmetry 9:1–13
Li X, Jiang P, Chen T, Luo X, Wen Q (2017) A survey on the security of blockchain systems. Future Gener Comput Syst
Zyskind G, Nathan O et al (2015) Decentralizing privacy: using blockchain to protect personal data. In: Security and privacy workshops (SPW), IEEE, pp 180–184
Zheng Z, Xie S, Dai H, Wang H Blockchain challenges and opportunities: a survey. Work Pap
Verma D, Desai N, Preece A, Taylor I A blockchain based architecture for asset management in coalition operations. SPIE
Gierschner F, Beyond B (2018) Consumers and health information technology: a national survey. In: California Health Care Foundation
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mistry, U., Patel, R. (2021). Access Control Mechanism for Cloud Data Using Block Chain and Proxy Re-Encryption. In: Kotecha, K., Piuri, V., Shah, H., Patel, R. (eds) Data Science and Intelligent Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 52. Springer, Singapore. https://doi.org/10.1007/978-981-15-4474-3_44
Download citation
DOI: https://doi.org/10.1007/978-981-15-4474-3_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4473-6
Online ISBN: 978-981-15-4474-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)