Paper Title : Securing Data and Providing Privacy Assurance using Revocation in Distributed Cloud Server
ISSN : 2394-2231
Year of Publication : 2021
10.29126/23942231/IJCT-v8i2p41
MLA Style: C.Surya, S.Banumathi, A.Neelavathi, B.Pooja, R.Manonmani " Securing Data and Providing Privacy Assurance using Revocation in Distributed Cloud Server " Volume 8 - Issue 2 March-April , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: C.Surya, S.Banumathi, A.Neelavathi, B.Pooja, R.Manonmani " Securing Data and Providing Privacy Assurance using Revocation in Distributed Cloud Server " Volume 8 - Issue 2 March-April , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
Abstract
To increase the security issues in a private cloud storage from traitor we propose Encrypting File Sharing And Synchronizing Using Efficient Traitor Tracing And Revocation. It implements the revocation algorithms to block the traitors and generates a traitor tracing technique to trace the presence of the traitors. The proposed methodology is suitable for a private cloud storage which can be modified in future to support public clouds. It propose, if an user uploads his data to a cloud storage server the user will be provided with a private and public key. The public key is used to verify that the user belongs to the concerned private cloud. In case of any abnormal activity the proposed methodology revocates the specific user using IP and MAC addresses and provides the longitude and latitude information to the data owner. In addition pattern matching, SQL injection and anomaly detection are proposed to maintain the privacy and security.
Reference
[1] F. R. INSTITUTE, “PERSONAL DATA IN THE CLOUD: A GLOBAL SURVEY OF CONSUMER ATTITUDES,” HTTP://WWW.FUJITSU.COM/DOWNLOADS/SOL/FAI/REPORTS/ FUJITSU/PERSONAL-DATA-IN-THE-CLOUD.PDF, 2010. [2] D. QUICK AND K. R. CHOO, “GOOGLE DRIVE: FORENSIC ANALYSIS OF DATA REMNANTS,” J. NETWORK AND COMPUTER APPLICATIONS, VOL. 40, PP. 179– 193, 2014. [3] H. CHUNG, J. PARK, S. LEE, AND C. KANG, “DIGITAL FORENSIC INVESTIGATION OF CLOUD STORAGE SERVICES,” DIGITAL INVESTIGATION, VOL. 9, NO. 2, PP. 81–95, 2012. [4] D. BONEH AND M. K. FRANKLIN, “AN EFFICIENT PUBLIC KEY TRAITOR TRACING SCHEME,” IN CRYPTO, 1999, PP. 338– 353. [5] D. BONEH, A. SAHAI, AND B. WATERS, “FULLY COLLUSION RESISTANT TRAITOR TRACING WITH SHORT CIPHERTEXTS AND PRIVATE KEYS,” IN EUROCRYPT, 2006, PP. 573–592. [6] Z. LIU, Z. CAO, AND D. S. WONG, “TRACEABLE CP-ABE: HOW TO TRACE DECRYPTION DEVICES FOUND IN THE WILD,” IEEE TRANS. INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 1, PP. 55–68, 2015. [7] D. BONEH AND M. K. FRANKLIN, “IDENTITY-BASED ENCRYPTION FROMTHE WEIL PAIRING,” IN CRYPTO, 2001, PP. 213–229. [8] A. SAHAI AND B. WATERS, “FUZZY IDENTITY-BASED ENCRYPTION,” IN EUROCRYPT, 2005, PP. 457–473 [9] V. GOYAL, O. PANDEY, A. SAHAI, AND B. WATERS, “ATTRIBUTE-BASED ENCRYPTION FOR FINE-GRAINED ACCESS CONTROL OF ENCRYPTED DATA,” IN ACM CONFERENCE ON CCS, 2006, PP. 89–98. [10] R. OSTROVSKY, A. SAHAI, AND B.WATERS, “ATTRIBUTEBASED ENCRYPTION WITH NON-MONOTONIC ACCESS STRUCTURES,” IN ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, PP. 195–203. [11] S. YAMADA, N. ATTRAPADUNG, G. HANAOKA, AND N. KUNIHIRO, “GENERIC CONSTRUCTIONS FOR CHOSENCIPHERTEXT SECURE ATTRIBUTE BASED ENCRYPTION,” IN PUBLIC KEY CRYPTOGRAPHY, 2011, PP. 71–89. [12] M. J. ATALLAH, M. BLANTON, N. FAZIO, AND K. B. FRIKKEN, “DYNAMIC AND EFFICIENT KEY MANAGEMENT FOR ACCESS HIERARCHIES,” ACM TRANS. INF. SYST. SECUR., VOL. 12, NO. 3, 2009. [13] M.BLANTON AND K. B. FRIKKEN, “EFFICIENT MULTIDIMENSIONAL KEY MANAGEMENT IN BROADCAST SERVICES,” IN ESORICS, 2010, PP. 424–40. [14] D.BONEH, X. BOYEN, AND E.-J. GOH, “HIERARCHICAL IDENTITY BASED ENCRYPTION WITH CONSTANT SIZE CIPHERTEXT,” IN ADVANCES IN CRYPTOLOGY (EUROCRYPT’2005), VOL. 3494 OF LNCS, 2005, PP. 440–456. [15] S. BERKOVITS, “HOW TO BROADCAST A SECRET,” IN ADVANCES IN CRYPTOLOGY (EUROCRYPT’91), VOL. 547 OF LNCS. SPRINGER-VERLAG, 1991, PP. 536–541. [16] D. BONEH, X. BOYEN, AND E.-J. GOH, “HIERARCHICAL IDENTITY BASED ENCRYPTION WITH CONSTANT SIZE CIPHERTEXT,” IN ADVANCES IN CRYPTOLOGY (EUROCRYPT’05), VOL. 3494 OF LNCS, HTTP://EPRINT.IACR.ORG/2005/015, 2005, PP. 440–456. [17] J.BETHENCOURT, A. SAHAI, AND B. WATERS, “CIPHERTEXTPOLICY ATTRIBUTE-BASED ENCRYPTION,” IN IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2007, PP. 321–334. [18] D. BONEH AND B. WATERS, “A FULLY COLLUSION RESISTANT BROADCAST, TRACE, AND REVOKE SYSTEM,” IN ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2006, PP. 211–220. [19] N. ATTRAPADUNG AND H. IMAI, “CONJUNCTIVE BROADCAST AND ATTRIBUTE-BASED ENCRYPTION,” IN PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, THIRD INTERNATIONAL CONFERENCE, PALO ALTO, CA, USA, AUGUST 12-14, 2009, PROCEEDINGS, 2009, PP. 248–265. [20] A.FIAT AND M. NAOR, “BROADCAST ENCRYPTION,” IN ADVANCES IN CRYPTOLOGY (CRYPTO’93), VOL. 773 OF LNCS. SPRINGER-VERLAG, 1994, PP. 480–491
Keywords
———encryption, traitor tracing, revocation, privacy, security, and anamoly detection.