Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : V Karthik | A Alice Gavya

Volume 02 Issue 06  Year 2015 

ISSN no: 2348-3121

Page no: 16-19

Abstract— Cloud computing is a general term for the delivery of hosted services over the Internet. In cloud environment data’s should be stored in encrypted manner to protect it from illegal access of data stored in the cloud service provider. To secure the data of the cloud user’s, here proposed a TLE scheme with delegated access rights to the cloud users where the delegated access rights can be maintain and managed by Data Owner. Here decomposing access right policies such that it satisfies TLE scheme. The proposed system includes a Merkle Hash Tree that can used for verification of contents of the large data structures that is stored in the cloud. It provides privacy for user’s data and keep it confidentially while enforcing attribute based ACPs. Thus the proposed system prevents it from unauthorized access of data stored in the cloud and provides various levels of verification of data.

Keywords Cloud Computing; TLE Scheme; Merkle Hash Tree


[1] Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attri-buteBased Encryption,” Proc. IEEE Symp. Security and Privacy (SP ’07), pp. 321-334, (2007).
[2] J. Camenisch, M. Dubovitskaya, and G. Neven, “Oblivious Trans-fer with Access Control,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS ’09), pp. 131-140, (2009).
[3] M. Nabeel and E. Bertino, “Privacy preserving delegated access control in the storage as a service model” in I EEE International Conference on Information Reuse and Integration (IRI), (2012).
[4] M. Nabeel and E. Bertino, “Privacy preserving policy based content sharing in public clouds,“In IEEE Transactions on Knowledge and Data Engineering, (2012).
[5] M. Nabeel, E. Bertino, M. Kantarcioglu, and B. M. Thuraisingham, “Towards privacy preserving access control in the cloud,” in Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, ser. CollaborateCom ’11, pp. 172–180,(2011).
[6] M. Nabeel and E. Bertino, “Towards attribute based group key management,” in Proceedings of the 18th ACM conference on Computerand communications security, Chicago, Illinois, USA, (2011).

Full Paper: Click Here

Scroll Up