Dual Access Control for Cloud-Based Data Storage and Sharing

Authors(2) :-N. Bavana, M. Induu

In recent years, cloud-based data storage systems have become more and more popular in academia and industry due to their efficient and reasonably priced management. Because service providers operate in an open network, it is essential that they Adopt secure data storage and exchange practices to protect customer confidentiality and privacy. Encrypt is the most popular technique for guarding against the compromise of private information. However, data encryption on its own—using AES, for instance—is unable to satisfy the practical need for data management. A robust download request access control system is also necessary to guard against attacks such attempts to prevent users from using the service, such as Financial Denial of Sustainability (EDoS). In this work, we explore the use of dual access control for cloud-based storage, ensuring that security and efficiency are maintained while establishing a control mechanism for download and data access requests. In this study, 2 dual authentication systems are built, one for a particular planned context. There is also a security analysis and an experimental review of the systems.

Authors and Affiliations

N. Bavana
Assistant Professor, Department of MCA, Annamacharya Institute of Technology & Sciences, Tirupati, Andhra Pradesh, India
M. Induu
Post Graduate, Department of MCA, Annamacharya Institute of Technology & Sciences, Tirupati, Andhra Pradesh, India

Access Pattern, Search Pattern, Multi-Keyword Searching, Multi-User Access, Searchable Encryption.

  1. Aviel D. Rubin, Michael Rushanan, Matthew Green, Ian Miers, Christina Garman, Joseph A. Akinyele, and Matthew W. Pagano. Charm is a framework for quickly iterating over cryptosystem designs. 3(2): 111–128 in Journal of Cryptographic Engineering, 2013.
  2. Vincent Scarlata, Simon Johnson, Shay Gueron, and Ittai Anati. cutting edge CPU-based attestation and sealing technologies. In Volume 13, Page 7, of Workshop on Hardware and Architectural Support for Security and Privacy (HASP). ACM, 2013, New York, NY, USA.
  3. Antonis Michalas and Alexandros Bakas. The modern family is a reversible hybrid encryption method built on SGX, symmetric searchable encryption, and attribute-based encryption. Pages472–486in SecureComm 2019.
  4. Beimel, Amos. Safe protocols for key distribution and secret sharing. PhD dissertation, Technion, Haifa, Israel: Israel Institute of Technology, 1996.
  5. Amit Sahai, Brent Waters, and John Bethencourt. attribute-based ciphertext-policy encryption. Pages 321–334 of S&P 2007. IEEE, 2007.
  6. Srinivas Devadas and Victor Costan. The explanation of Intel SGX. 2016(086):1–118, IACR Cryptology ePrint Archive.
  7. Sergey Gorbunov, Dan Boneh, Dhinakaran Vinayagamurthy, and Ben Fisch. IRON: Intel SGX-based functional encryption. In CCS 2017, pages 765–782, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.
  8. Tatsuaki Okamoto and Eiichiro Fujisaki. Safe combination of symmetric and asymmetric cryptography techniques. Pages 537–554 in Advances in Cryptology–CRYPTO 1999. Springer (1999).
  9. Brent Waters, Amit Sahai, Omkant Pandey, and Vipul Goyal. For more precise access control over encrypted data, use attribute-based encryption. ACM CCS 2006, 89–98 pages. ACM, 2006.
  10. Man Ho Allen Au, Jinguang Han, Yi Mu, Jianying Zhou, and Willy Susilo. Enhancing security and privacy in attribute-based decentralized ciphertext-policy encryption. IEEE transactions on security and information forensics, 10(3), 665-678, 2015.
  11. Cloud computing security: From distributed denial of service (DDoS) to economic denial of sustainability (EDOs), Christofer Hoff. reasonablesurvivability.com/blog/?p=66.
  12. Doug Jacobson, Mark Tannian, and Joseph Idziorek. connection to unauthorized use of cloud resources. Pages 99–106 in IEEE CLOUD 2012. 2012 IEEE.

Publication Details

Published in : Volume 7 | Issue 2 | March-April 2024
Date of Publication : 2024-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 435-439
Manuscript Number : SHISRRJ247292
Publisher : Shauryam Research Institute

ISSN : 2581-6306

Cite This Article :

N. Bavana, M. Induu, "Dual Access Control for Cloud-Based Data Storage and Sharing", Shodhshauryam, International Scientific Refereed Research Journal (SHISRRJ), ISSN : 2581-6306, Volume 7, Issue 2, pp.435-439, March-April.2024
URL : https://shisrrj.com/SHISRRJ247292

Article Preview