Efficient hierarchical cloud storage data access structure with KDC

P. P. Gutal, R. Kothe, S.B. Jahveri
{"title":"Efficient hierarchical cloud storage data access structure with KDC","authors":"P. P. Gutal, R. Kothe, S.B. Jahveri","doi":"10.1109/ICAECCT.2016.7942607","DOIUrl":null,"url":null,"abstract":"Among various cloud services, storage is one of the fast utilizing and hugest category of cloud service. Very huge amount of data is stored at cloud storage servers by various users or organizations. With such services, various key issues are arises such as data security, confidentiality. To overcome these, the key concept was introduced such as Cryptography. In cryptography, various keys are used to encrypt or decrypt the data before uploading or downloading from cloud server. To generate the private and public key pair, distributed key generation (DKG) protocol was introduced. But within organization there is another issue is arises, regarding to authority based data access control policy. That is only user with particular authority can access data stored at cloud, based on their authority level. For this hierarchical threshold access structure (HTAS) is used along with DKG, known as HTDKG. In this, various users are divided into levels based on their designation and some threshold is assigned. At the time of data access, only specific levels users can access the specific amount of data. Because of this, all data is not revealed to any unconcern user. In existing system, HTDKG key generation and management is perform at user side which increases the management overhead. To overcome this issue, we introduced the third party Key Distribution Center (KDC), which execute the HTDKG protocol and take responsibility of all key generation, distribution and management activities. Experimental results prove that the proposed system decrease the processing time and enhances the memory utilization by utilizing of KDC.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"84 1","pages":"328-332"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECCT.2016.7942607","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Among various cloud services, storage is one of the fast utilizing and hugest category of cloud service. Very huge amount of data is stored at cloud storage servers by various users or organizations. With such services, various key issues are arises such as data security, confidentiality. To overcome these, the key concept was introduced such as Cryptography. In cryptography, various keys are used to encrypt or decrypt the data before uploading or downloading from cloud server. To generate the private and public key pair, distributed key generation (DKG) protocol was introduced. But within organization there is another issue is arises, regarding to authority based data access control policy. That is only user with particular authority can access data stored at cloud, based on their authority level. For this hierarchical threshold access structure (HTAS) is used along with DKG, known as HTDKG. In this, various users are divided into levels based on their designation and some threshold is assigned. At the time of data access, only specific levels users can access the specific amount of data. Because of this, all data is not revealed to any unconcern user. In existing system, HTDKG key generation and management is perform at user side which increases the management overhead. To overcome this issue, we introduced the third party Key Distribution Center (KDC), which execute the HTDKG protocol and take responsibility of all key generation, distribution and management activities. Experimental results prove that the proposed system decrease the processing time and enhances the memory utilization by utilizing of KDC.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
具有KDC的高效分层云存储数据访问结构
在各种云服务中,存储是使用速度最快、规模最大的云服务类别之一。各种用户或组织将大量数据存储在云存储服务器上。有了这些服务,就会出现各种关键问题,例如数据安全、机密性。为了克服这些问题,引入了诸如密码学之类的关键概念。在密码学中,在从云服务器上传或下载数据之前,使用各种密钥对数据进行加密或解密。为了生成私钥对和公钥对,引入了分布式密钥生成(DKG)协议。但是在组织内部出现了另一个问题,关于基于权限的数据访问控制策略。也就是说,只有具有特定权限的用户才能根据其权限级别访问存储在云中的数据。为此,分层阈值访问结构(HTAS)与DKG(称为HTDKG)一起使用。在这种方法中,根据用户的名称将不同的用户划分为不同的级别,并分配一定的阈值。在数据访问时,只有特定级别的用户才能访问特定数量的数据。因此,所有数据都不会透露给任何无关的用户。在现有的系统中,HTDKG密钥的生成和管理是在用户端进行的,这增加了管理开销。为了克服这个问题,我们引入了第三方密钥分发中心(KDC),它执行HTDKG协议并负责所有密钥生成、分发和管理活动。实验结果表明,该系统利用KDC技术减少了处理时间,提高了内存利用率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Keynote speakers Emotweet: Sentiment Analysis tool for twitter Design of faster & power efficient sense amplifier using VLSI technology A comparative study on distance measuring approches for permutation representations An embedded system of dedicated and real-time fire detector and locator technology as an interactive response mechanism in fire occurrences
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1