• Corpus ID: 14866246

Capability-based Cryptographic Data Access Control in Cloud Computing

  title={Capability-based Cryptographic Data Access Control in Cloud Computing},
  author={Chittaranjan Hota and Sunil Sanka},
Chittaranjan Hota, Sunil Sanka Department of Computer Science & Information Systems, BITS Pilani Hyderabad Campus, Hyderabad Email: hota@bits-hyderabad.ac.in, sunil.grt@gmail.com Muttukrishnan Rajarajan Information Security Group, School of Engineering & Mathematical Sciences, City University, London Email: r.muttukrishnan@city.ac.uk Srijith K. Nair Security Futures Practice, BT Innovate and Design, British Telecommunications, Suffolk IP5 3RE, UK Email: srijith.nair@bt.com 

A Novel Data Access Scheme in Cloud Computing

Security analysis shows that the scheme can resist various attacks, and a novel data access protocol in cloud computing is proposed, which guarantees data confidentiality and secure data access between User and CSP.

Cloud Computing Based Data Security by Using Threshold Cryptography

A scheme its threshold cryptography in which data owner can divide users in group and provide single key with the using key each user in group can access the data and this scheme not only provide data security but also provide reduce number of keys.


A scheme named threshold cryptography is proposed within which information from owner will be divided among its users in cluster and partial key will be shared with all users in the cluster to provide sturdy information confidentiality.

Secure and Robust Cloud Storage with Cryptography and Access Control

A secure and robust cloud storage architecture is illustrated by combining cryptography and access control with two layered encryption, which overcomes the issue of data security in cloud environment.

A Survey Paper on Data Security in Cloud Computing using Threshold Cryptography and User Revocation

This paper proposes a plan that uses threshold cryptography in which information proprietor partitions clients in gatherings and gives single key to each client bunch for decoding of information and, every client in the gathering shares parts of the key.

Secure Data Access in Cloud Computing

A scheme its threshold cryptography in which data owner can divide users in group and provide single key with the using key each user in group can access the data and this scheme not only provide data security but also provide reduce number of keys.

Secured Data Exchange in Cloud Computing

The scheme that uses Threshold Cryptography technique in which data owner divides users in groups and gives single key to each user group for decryption of data and, each user in the group shares parts of the key is proposed.

SMDS: Secure Model for Cloud Data Storage

This paper addresses the issue of storage correctness in Cloud computing and proposes operational algorithms which may be used to build a complete solution.

Achieving Data Integrity in Cloud Storage Using BLAKE Hash Function

This paper applies integrity check without using TPA and use cryptographic hash function BLAKE to generate the signature of file or massage and this proposed model achieves storage correctness, Data Confidentiality, Authentication, Integrity and Efficient Data Access in cloud’s dynamic nature.

Analysis of Cloud Security Issues and Security Architecture Based on RSA, Tokenization and Digital Signature

This paper identifies major security issues in cloud and their solutions and proposes the implementation of an encryption architecture based on the very secure RSA algorithm, tokenization and digital signature.



A PKI-based mechanism for secure and efficient access to outsourced data

  • Jiazhu DaiQin Zhou
  • Computer Science
    2010 International Conference on Networking and Digital Society
  • 2010
A PKI-based access control mechanism is proposed that not only ensures secure access to the outsourced data, but also relieves the data owner from user's every access procedure, thus avoiding the owner will become the bottleneck during the access and achieve high efficiency.

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption.

Secure and efficient access to outsourced data

This paper proposes to encrypt every data block with a different key so that flexible cryptography-based access control can be achieved, and investigates the overhead and safety of the proposed approach, and study mechanisms to improve data access efficiency.

Improved proxy re-encryption schemes with applications to secure distributed storage

Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.

A data outsourcing architecture combining cryptography and access control

This paper illustrates the basic principles on which an architecture for combining access control and cryptography can be built and illustrates an approach for enforcing authorization policies and supporting dynamic authorizations, allowing policy changes and data updates at a limited cost in terms of bandwidth and computational power.

SiRiUS: Securing Remote Untrusted Storage

This paper presents SiRiUS, a secure file system designed to be layered over insecure network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase that contains a novel method of performing file random access in a cryptographic file system without the use of a block server.

Controlling data in the cloud: outsourcing computation without outsourcing control

It is argued that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today.

Toward securing untrusted storage without public-key operations

This paper examines design alternatives that avoid public-key cryptography operations to achieve better performance and presents the trade-offs and limitations that are introduced by these substitutions.

Cryptographic Cloud Storage

We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We describe, at a high

An Optimal Class of Symmetric Key Generation Systems

  • R. Blom
  • Computer Science, Mathematics
  • 1984
The objective of this paper is to present a class of SKGS for which the amount of secret information needed by each user to generate his keys is the least possible while at the same time a certain minimum number of users have to cooperate to resolve the uncertainty of unknown keys.