Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers
ABSTARCT :
Cloud computing is considered as one of the most prominent paradigms in the information technology industry, since it can significantly reduce the costs of hardware and software resources in computing infrastructure. At the first sight, by merely storing the shared data as plaintext in the cloud storage and protect them using an appropriate access control would be a nice solution. Therefore, encryption is mandatory, and the shared data will need to be stored as a ciphertext using an appropriate access control. However, in practice, some of these employees may be malicious and may want to deviate from the required sharing policy. The existing protection in the literature has been explored to allow only legitimate recipients to decrypt the contents stored in the cloud storage, but unfortunately, no existing work deals with issues raised due to the presence of malicious data publishers. In this work, we present a new direction of research that can cope with the presence of malicious data publishers. We resolve the aforementioned problem by proposing the notion of Sanitizable Access Control System (SACS) to solve the aforementioned problem.
EXISTING SYSTEM :
? In Existing the document or file which is being stored by client in the cloud computing means that was stored entirely due to this someone can able to hack that so, hacker can able to see all the information’s of the uploaded file.
? The system model involves five kinds of different entities: the cloud, the user, the sanitizer, the Private Key Generator (PKG) and the Third Party Auditor The cloud provides enormous data storage space to the user.
? Through the cloud storage service, users can upload their data to the cloud and share their data with others.
? The user is a member of an organization, which has a large number of files to be stored in the cloud.
DISADVANTAGE :
? We leave the construction of a CD-ABACE scheme based on a Boolean circuit instead of AND-gate circuits with the same performance as an interesting open problem.
? To avoid this security problem, the signature used in requires strongly unforgeable chameleon hashes, which will inevitable incur huge computation overhead.
? To reduce the damage of users’ key exposure, Yu et al. proposed key-exposure resilient remote data integrity auditing schemes based on key update technique.
? First identify the difficulties and potential security problems has been direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for the seamless integration of these two salient features in our design.
PROPOSED SYSTEM :
• The proposed construction guarantees that no PPT adversary can obtain the receiver’s identity, deterministically.
• We examine how the performance of our proposed CD-ABACE scheme compares to the selectively-secure Wang and Chow scheme [WC21], which is the only implemented ACE construction to date.
• In contrast, the proposed variant of Abe et al.’s SPS requires no new generator for the second cyclic group, and the intended NIZK proof cuts out the need for target group operations.
• In this work, we proposed a generic and accordingly an efficient Cross-Domain AttributeBased Access Control Encryption schemes that are based on the set of attributes that the users possess.
ADVANTAGE :
? To efficiently support data sharing with sensitive information hiding in identity-based integrity auditing for secure cloud storage.
? While the proposal of the ACE-concept and of efficient ACE-schemes were important first steps toward outsourcing access control, the existing security definition turns out to be insufficient for several realistic attack scenarios.
? We consider a scheme secure if an adversary can efficiently produce a ciphertext such that there is a receiver role that can decrypt it even though the policy does not allow it, as long as this receiver role is hard to find.
? To settle these questions, the authors are currently working on a theoretical model to capture the use case of ACE in a simulation-based framework. Another interesting research direction is to find more efficient schemes for useful policies.
|