Data integrity and revocable attribute-based encryption in clouds
C.Anuradha
Department of Computer Science and Engineering
SCAD College of Engineering and Technology
TamilNadu, India
A.Merlin Ponselvi
Department of Computer Science and Engineering
SCAD College of Engineering and Technology
TamilNadu, India
merlin.ponselvi@gmail.com
Abstract— One of the most promising application platforms to address the exponential growth in data sharing is cloud computing. Users must encrypt their data before sharing it on the cloud in order to prevent data leaks. It enables clients with constrained computing resources to outsource their heavy computing tasks to the cloud and profitably take advantage of the enormous computing power, bandwidth, storage, and even relevant software that can be shared in a pay-per-use way. The importance of access control cannot be overstated because it serves as the first line of defense against unauthorized access to shared data. On the one hand, the workloads for outsourced computation frequently include sensitive data, including firm financial records, confidential research information, and individually identifiable health data. Sensitive data must be encrypted prior to outsourcing in order to guarantee end-to-end data confidentiality assurance in the cloud and elsewhere. This will help prevent unauthorized information leaking. Clients run the danger of crucial exposure that goes unnoticed but was evident in earlier studies. The practical application of ABE is further restricted by the significant client decryption overhead. The suggested cooperative technique successfully addresses both the issue of key exposure and key escrow. We provide a specific RABE-DI scheme and demonstrate its integrity and confidentiality inside the specified security architecture. In the meanwhile, it significantly lowers client decryption overhead. However, standard data encryption methods effectively prevent the cloud from carrying out any useful operations on the underlying cipher text-policy, which makes the task of computing over encrypted data very challenging.
Keywords—access control, data leaks, key exposure, key escrow, cipher text-policy.