{"title":"Efficient hierarchical cloud storage data access structure with KDC","authors":"P. P. Gutal, R. Kothe, S.B. Jahveri","doi":"10.1109/ICAECCT.2016.7942607","DOIUrl":null,"url":null,"abstract":"Among various cloud services, storage is one of the fast utilizing and hugest category of cloud service. Very huge amount of data is stored at cloud storage servers by various users or organizations. With such services, various key issues are arises such as data security, confidentiality. To overcome these, the key concept was introduced such as Cryptography. In cryptography, various keys are used to encrypt or decrypt the data before uploading or downloading from cloud server. To generate the private and public key pair, distributed key generation (DKG) protocol was introduced. But within organization there is another issue is arises, regarding to authority based data access control policy. That is only user with particular authority can access data stored at cloud, based on their authority level. For this hierarchical threshold access structure (HTAS) is used along with DKG, known as HTDKG. In this, various users are divided into levels based on their designation and some threshold is assigned. At the time of data access, only specific levels users can access the specific amount of data. Because of this, all data is not revealed to any unconcern user. In existing system, HTDKG key generation and management is perform at user side which increases the management overhead. To overcome this issue, we introduced the third party Key Distribution Center (KDC), which execute the HTDKG protocol and take responsibility of all key generation, distribution and management activities. Experimental results prove that the proposed system decrease the processing time and enhances the memory utilization by utilizing of KDC.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"84 1","pages":"328-332"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECCT.2016.7942607","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Among various cloud services, storage is one of the fast utilizing and hugest category of cloud service. Very huge amount of data is stored at cloud storage servers by various users or organizations. With such services, various key issues are arises such as data security, confidentiality. To overcome these, the key concept was introduced such as Cryptography. In cryptography, various keys are used to encrypt or decrypt the data before uploading or downloading from cloud server. To generate the private and public key pair, distributed key generation (DKG) protocol was introduced. But within organization there is another issue is arises, regarding to authority based data access control policy. That is only user with particular authority can access data stored at cloud, based on their authority level. For this hierarchical threshold access structure (HTAS) is used along with DKG, known as HTDKG. In this, various users are divided into levels based on their designation and some threshold is assigned. At the time of data access, only specific levels users can access the specific amount of data. Because of this, all data is not revealed to any unconcern user. In existing system, HTDKG key generation and management is perform at user side which increases the management overhead. To overcome this issue, we introduced the third party Key Distribution Center (KDC), which execute the HTDKG protocol and take responsibility of all key generation, distribution and management activities. Experimental results prove that the proposed system decrease the processing time and enhances the memory utilization by utilizing of KDC.