R&D: Efficient Multi-Authority Access Control Using Attribute-Based Encryption in Cloud Storage
Advantages of proposed scheme become more and more conspicuous when there is more number of files at cloud storage server.
This is a Press Release edited by StorageNewsletter.com on May 7, 2020 at 2:24 pmProcedia Computer Science has published an article written by Praveen S.Challagidad, Basaveshwar Engineering College, Vidyagiri, Bagalkot-587103, India, and Mahantesh N.Birje, Visvesvaraya Technological Univeristy, Center for PG Studies, Belagavi-590018, India.
Abstract: “Cloud users are outsourcing their data day-by-day resulting in huge amount of data storage in Cloud server. Cloud service provider (CSP) themselves may go for modifying the data that leads to data integrity problem. Unauthorized users illegally gain access to the data stored in cloud server. Therefore, providing protection, achieving privacy and access control for user’s data are big challenges in the Cloud. Ciphertext-policy attribute-based encryption (CP-ABE) is prominent encryption technique to solve the exigent dilemma of secure data sharing in cloud computing. The shared data files generally have the characteristic of multilevel hierarchy, predominantly in the areas of IT companies, healthcare and military; these areas require a multi-authority access control. However, the hierarchy construction of shared files and multi-authority access control approach are not been investigated in CP-ABE. This paper proposes an efficient multi-authority access control using attribute-based encryption scheme that achieves efficient, fine grained access control. The proposed scheme consists of one algorithm – (Role Hierarchy Algorithm (RHA) and Hierarchy Access Structure (HAS) to protect user’s data, achieve privacy, multi-authority access control and fine grained access to a stored data. The RHA algorithm classifies Cloud users into groups based on their assigned attributes. The HAS helps to define an access structure for fine grained and multi-authority access control of Cloud resources. Simulation results prove that the proposed RHA, HAS are efficient (in terms of time consumption and storage consumption for encryption, decryption) compared to existing works. The advantages of proposed scheme become more and more conspicuous when there is more number of files at Cloud storage server.“