Affiliation:
1. Assistant Professor, Computer Science Engineering WCEM, Nagpur, India
2. M. Tech Second Year WCEM, Nagpur, India
Abstract
Cloud-based data storage service has drawn increasing interest from both academic and industry in recent years due to their efficient and low-cost management. Since it provides services in an open network, it is urgent for service providers to make use of secure data storage and sharing mechanism to ensure data confidentiality and service user privacy.
The most widely used method is encryption to protect sensitive data from being compromised. However, simply encrypting data (e.g., via AES) cannot fully address the practical need for data management. Besides, effective access control over download requests also needs to be considered so that Economic Denial of Sustainability (EDoS) attacks cannot be launched to hinder users from enjoying service.
In this project, we consider dual access control, in the context of cloud-based storage, in the sense that we design a control mechanism over both data access and download requests without loss of security and efficiency. Two dual access control systems are designed in this paper, each for a distinctly designed setting. The security and experimental analysis for the systems are also presented.
Reference40 articles.
1. Joseph A Akinyele, Christina Garman, Ian Miers, Matthew W Pagano, Michael Rushanan, Matthew Green, and Aviel D Rubin. Charm: a framework for rapidly prototyping cryptosystems. Jour- nal of Cryptographic Engineering, 3(2):111–128, 2013.
2. Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. Innovative technology for cpu based attestation and sealing. In Workshop on hardware and architectural support for security and priva- cy (HASP), volume 13, page 7. ACM New York, NY, USA, 2013.
3. Alexandros Bakas and Antonis Michalas. Modern Family: A revo- cable hybrid encryption scheme based on attribute-based encryption, symmetric searchable encryption and SGX. In SecureComm 2019, pages 472–486, 2019
4. Amos Beimel. Secure schemes for secret sharing and key distribution. PhD thesis, PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel, 1996. ?
5. John Bethencourt, Amit Sahai, and Brent Waters. Ciphertext-policy attribute-based encryption. In S&P 2007, pages 321–334. IEEE, 2007.