High Data Availability with Effective Data Integrity and User Revocation Using Abe Scheme for Cloud Storage
Prashant mininath mane1, C. M. Sheela rani2
1Mr. Prashant Mininath Mane, P.H.D, Research Scholar, Department of Computer Science and Engineering, K.L.E.F. University, Vijaywada, India.
2Dr. C. M. Sheela Rani, Professor, Department of Computer Science and Engineering, K.L.E.F. University, Vijaywada, India.
Manuscript received on 05 March 2019 | Revised Manuscript received on 12 March 2019 | Manuscript Published on 20 March 2019 | PP: 109-113 | Volume-8 Issue- 4S2 March 2019 | Retrieval Number: D1S0023028419/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: With Cloud Storage, organizational members can outsource their sensitive information on cloud; utilize the on demand quality applications and services of cloud, with less control over stored data. With this, there is important concern issue with security over sensitive data, which can be fixing with data encryption techniques. In this, owner of the data encrypt their sensitive information before storing on cloud systems. Attribute based Encryption (AttBE) system is one of the asymmetric key based cryptosystem, used for secure control to access the stored data of cloud. Unfortunately, AttBE provides fine grained control to access the data but suffers from a drawback of data integrity. As Sensitive information is stored on the cloud, there is no guarantee of integrity of data because of data may loss or stolen by cloud itself or any hacker. Proposed system handles this problem by introducing the third party authority. TPA stores the data on cloud in the form of blocks and then he checks each and every block by regular integrity check. Proposed system also address the issue of revocation in case of user leaving the group or organization; once a user is removed from the group, the keys are updated and these new keys are distributed among the existing users. Experimental results show the performance of projected system is better than the current implemented systems in terms of time consumption and memory utilization.
Keywords: Searchable Encryption, Data Availability, Cloud Computing, Revocation of Attributes, User Revocation.
Scope of the Article: Computer Science and Its Applications