SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3480
Secure Data Access Control with Cipher Text and It’s Outsourcing in
Fog Computing
Kirti Madhavi1, Neha Bhutkar2, Pratiksha Kadu3, Babita Bhagat4
1,2,3 Student, Computer of Engineering, PHCET College, Maharashtra ,India
4 Faculty, Computer of Engineering, PHCET College, Maharashtra, India
-------------------------------------------------------------------------------***--------------------------------------------------------------------------------
Abstract - In spite of the abundant advantages of storing
data on cloud, Security still remains a major hurdle which
needs to be conquered. The subsisting methods of protecting
data on cloud have failed in preventing data theft attacks. An
altered approach is carried out in our proposed system for
securing the data, which is fog computing, in addition to the
previous standard encryption mechanisms.Theusersusingthe
Cloud are monitored and their access patterns are recorded.
Every person who is trying to access the data is made to
answer the security questions. Also an OTP isprovidedtoavoid
shoulder sniffing of password.
Fog computing is nothing but cloud computing to the
extreme of the network security. It provides computation and
storage services via CSP (Cloud Service Provider) to end
devices in Internet of Things (IoT). Attribute-BasedEncryption
(ABE) is a public key encryption scheme that allows users to
encrypt and decrypt messages based on user attributes,which
guarantees data confidentiality and powerful data access
control. However, its computational cost for encryption and
decryption phase is directly proportional to the complexity of
the policies used.
Key Words: Access Control, Attribute BasedEncryption,
Attribute Based Signature, Cipher text-Policy Attribute
Based Encryption, Cloud ServiceProvider,DataSecurity,
Internet of Things, Fog Computing.
1. INTRODUCTION
Today, cloud computing is considered a promising
prototype of computing, since it can provide users with
elastic computing resources based on shared computing
techniques, virtualization, etc. However, the universality of
Internet of Things (IoT) applications is changing the main
factor of computing. Centralized computer systems suffer
from unacceptable transmission latency andreducedsystem
performance due to the extremely large volume traffic
between IoT nodes and the cloud. Cloud computing is an
encouraging technology that exploitsthe prototypesofcloud
computing and IoT.
Although the "fog computing" prototype generates many
benefits, security issues, including data privacy and access
control, are the same as cloud computing and information
technology. In addition, they are easier to compromise and
unreliable, since fog nodes are distributed at the edge of the
network and cost much less than servers in the cloud.
Another way to solve these problems is to encrypt user data
before uploading. Attribute-based encryption(ABE)isaone-
to-many cryptographic technique that meets these
requirements. It hastoolsand techniquesthatprovideaccess
control to the encrypted data through variousaccesspolicies
and attributes referring to private keys and cryptographic
texts. In particular, the ABE encryption text policy (CP-ABE)
allows the data owner to define the access policy on a
universe of attributes that the user must possess to decrypt
the encrypted text and apply it to the data. This ensures the
confidentiality and control of high-precision data access.
However, existing solutions based on ABE are mainly aimed
at managing secure access to data for users, few studies
believe that there is no other requirement that the owner of
the data you want to authenticate some usersto update data
encrypted. For example, Alice hasoutsourced cryptographic
data and data to the cloud, and expects only her many
friends who are authorized users can renew the
cryptography of the initial text. Therefore, the key update is
the secure encryption text that the user renews the cipher
text must be able to convince the cloud service provider
(CSP), which is a valid user. The traditional approach is to
sign changed data, which means that CSP shouldmaintainat
the same time a list of valid public key users to verify users'
identities. However, it would be a big burden to keep the list
of keys, if the current number of users and CSP can know the
identity of users in this way, revealing the user's privacy. A
recent cryptographic technique known as based on study
attributes(ABS) can help the CSP to verify if the user isvalid.
In an ABS system, the user can sign messageswith a political
request and its attributes. Then, with the signature, the CSP
can verify the signer attributes satisfy the affirmation policy
without even knowing the signer's identity.
Therefore, the adoption of ABE and ABS can guarantee
data privacy, detailed access control and user verification,
but at the same time also implies a high computational cost
in cloud computing. The encryption, decryption and
signature operations of ABE and ABS require a largenumber
of module exponents, which normally grow linearly withthe
number of attributes in the policies. This is a significant
challenge for users who access and modify data on IoT
devices with limited resources with limited computing and
archiving capabilities.
In this paper, we propose a secure control scheme for
accessing data in cloud computing for IoT. The main
contributions are as follows:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3481
1]. we propose a detailed data access control scheme with
updated cryptography text based on CP-ABE and ABS in fog
computing. First, the confidential data of IoT devices are
encrypted with multiple policiesand then outsourced to the
servers in the cloud through the nearby fog nodes. The
authorized user whose attributesmeet the accesspolicy can
decrypt the encryption text stored on servers in the cloud.
Secondly, the authorized user can modify the decrypteddata
and re-subcontract them with his signature. If the user's
attributes in the signature match the update policy, cloud
servers can renew the encryption text.
2]. We provide a secure outsourcing framework that
outsources most encryption, decryption and signature
processes from the final IoT devices to fog nodes.
2. RELATED WORKS
Cloud computing is considered asa level in the middle of the
cloud and end users are formed by fog nodes, such as
routers, switches, etc. hardened. It is immediate for end
users that servers in the cloud and some of the workloads
and services that the cloud transfersto fog nodes. Fog nodes
are semi-independent, aswell asnodesin the cloud anddata
security would cause great concern to userswhen theystore
sensitive data on cloud serversthroughfognodes.Therefore,
a new access control system with cloud, fogandusersshould
be considered, since the network structures and system
prototypes are different, in which the fog nodesshouldserve
the user to provide less computing complexity and greater
flexibility for users.
ABE is an encouraging cryptographic technique to provide
end users with scalable, flexible and fine-grained access
control. The concept of ABE was initially proposed by Sahai
and Waters as a new method for fuzzy identity based
encryption. ABE has two variants, the key to the ABE
(KPABE) and CP-ABE policy. In fact, it becomes a powerful
mechanism that can be applied to perform access control in
many IoT applications. Yu et al. introduced for the first time
the problem of controlling access to fine-grained data in
wireless sensor networks and adopted KP-ABE to protect
data. Unlike KP-ABE, CP-ABE is very suitable for access
control in IoT because of its expressivenessin describingthe
cryptographic text accesspolicy. Hu et al. I designedasecure
data communication scheme between portable sensors and
data consumers through the use of CP-ABE in wireless
networks for body areas. Jiang et al. introduced a CP-ABE
scheme against the abuse of key delegation in cloud
computing. Yeh et al. proposed a detailed framework for
controlling access to health information in the cloud for
lightweight IoT devices.
However, the most important drawback of theuseofABEin
fog computing is the computational cost in the encryption
and decryptions phase that is directly proportional to the
complexity of the policy. Fog nodes, the edgeofthecloudand
closer to end users, are one of the best options for
outsourcing proxy, which can be used to make massive
calculations to reduce the computational overhead required
in IoT devices with limited resources. The main solution of
the current schemes is to distribute the calculations of the
CP-ABE encryption and decryption phase, so thatthelimited
IoT devicescan delegate most of theconsumptionoperations
to the nodes of the network. Louniset al. has designed a
cloud based architecture for medical WSNs, where sensor
nodes outsource cryptographic operations to a reliable
gateway that encrypts CP-ABE-based data before sending it
to the cloud.
However, this solution adopts a completely reliable entityto
perform data encryption that does not achieve the
outsourcing of the practical calculation. Zuo et al. They
designed a concrete ABE schemewithoutsourceddecryption
for fog computing. Yang et al. proposed a concrete
construction with a light computational overheadfortheIoT
health system, where a semi-reliable computing center is
introduced to apply most of the heavy calculations in the
data encryption phase. Yang and others have proposed two
multiple cloud-based ABE schemes for IoT, which allow
receiversto outsource computational decoding to the cloud.
However, these schemes can only support outsourced
encryption or in-work decryption. Zhang et al. hasproposed
an access control system for fog computing, which
outsources the heavy calculation of cryptography and
decoding in fog nodes, so the calculations to encrypt and
decrypt are irrelevant to the number of attributes in the
access policy.
To perform cryptographic text update services in fog
computing, the CSP must be able to verify the user's test
before accepting the modified cryptographic text. ABS is an
emerging signature algorithm to ensure anonymous user
authentication. It wasintroduced for the first time by Majiet
al. Provide authentication without revealing user identities.
Based on ABS, Ruj et al. has proposed a new decentralized
access control system for the secure reading and writing of
data in the cloud, which supports the authentication of
anonymous users. In this scheme, the cloud verifies
authenticity without knowing the user's identity before
storing data. His et al. proposed an expressiveschemeofABS
in IoT, which usesan attribute tree to ensure that onlyauser
with the appropriate attributes that meet the access policy
can approve the message.
However, in existing ABS works, a large computational cost
is needed during the signature phase, which also grows
linearly with the size of the predicate formula. Chen et al.
they are the first to present two ABS outsourced schemes in
which the computational load on the user's side is greatly
reduced by outsourcing intensive calculations for CSP that
are not reliable. Inspired by this, our schema performs
anonymous authentication of the user during the update of
the encryption text and delegates most of the signature
operations to the fog nodes.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3482
3. SYSTEM MODEL
System Model
1]. Attribute authority. The attribute authority is a fully
trusted party which is in charge of generating system
parameters as well as secret key for each user.
2]. CSP. The CSP is a semi-trusted party which provideshigh-
capacity and online data storage service. It is also
responsible for verifying the signature before accepting the
updated cipher text.
3]. Fog node. The fog nodes are also semi-trusted parties
which are deployed at the network edge and offer a variety
of services. They are in charge of generating part of the
cipher text and uploading the whole cipher text to the CSP,
and also helping users to decrypt the cipher text from the
CSP. Moreover, they assist end users to sign the cipher text
update request.
4]. Data owner. The data owner has a great amount of data
from the IoT devices to be uploaded to cloud. Itisdesignedto
define access and update policies to generate the whole
cipher text with the fog nodes.
5]. User. The user is attached to fog nodesandequippedwith
IoT devices such as smart cameras, medical sensors and
smart meters.
FIGURE 1: SYSTEM MODEL
SYSTEM DEFINITION
We define our proposed scheme by describing the following
five phases and nine algorithms.
Phase 1: System setup
1) Setup 1: The attribute authority takes as input security
Parameter k, and outputs the system public key (PK) and
master secret key (MK).
Phase 2: Key generation
2) Key Gen (PK, MK, S). The attribute authoritytakesasinput
PK, MK, a set of attributes S, outputs the secret key SK forthe
user. And the outsourcing key SK' is sent to fog nodes.
Phase 3: Data symmetric encryption
3) Fog. Encrypt (PK, T). The fog node takes as input PK, an
access policy T, outputs a partial cipher text CT’.
4) Owner. Encrypt (PK, M, Tu, CT). The data owner takes as
input PK, a data M, an update policy Tu, a partial cipher text
CT’, and outputs the cipher text CT.
Phase 4: Data decryption
5) Fog. Decrypt (PK, CT, SK'). The fog node takes asinput PK,
a cipher text CT and a user’s SK’, and outputs a partial
decrypted cipher text T if the attributes satisfy access policy
T.
In the cipher text CT.
6) User. Decrypt (T, SK). The user takes as input a partial
decrypted cipher text T and SK, then recovers the MK and
outputs the plaintext M.
Phase 5: Cipher text update
7) Fog. Sign (PK, U, Tu, SK’). The fog node takes asinputPK,a
user’s cipher text update request U and
SK’, update policy Tu. It outputs a partial signature ST' and
the global key GK.
8) User. Sign (PK, ST’, SK). The user takes as input PK, a
partial signature ST' and SK, outputs the signature ST.
9) Verify (Public key, ST, GK). The CSP takes as input PK, a
signature ST and a global key GK. It outputs true if ST is a
valid signature by the signer whose attributes satisfying Tu.
The workflow of our scheme is shown in the figure. In the
initialization phase, the attribute authority uses the
configuration algorithm to generate the system parameter.
Generating keys with the algorithm, the authority attribute
generates secret keys for owners and users of the data. To
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3483
achieve high encryption efficiency, the ownerentersthedata
collected first with a random DK applying a symmetric
encryption algorithm and defines an access policy and a
policy update, the node usesthe fog algorithm Encryptionto
encrypt partially data accesspolicy, and then the dataowner
uses a proprietary .Encrypt algorithm to terminate the
encryption with access to the policy and policy update and
stored in the CSP. When accessing data, the fog node first
uses the fog algorithm. Decryption to decipher partially
encrypted text, the user can use the user. Decryption
algorithm to recover data. After modifying the data, the user
also uses phase encryption algorithms to encrypt the
updated data. Before making the final modification, the user
uses the user. Join algorithm to generate the signature with
the return of partial signature of fog node. Algorithm of the
sign. Then, the CSP uses the Verify algorithm to verify the
signature and finally accepts the updated encrypted text if
the signature is true. In the end, other users can get the
updated data with the decryption algorithms. Therefore,
users with Think Internet devices can access and efficiently
update sensitive data in fog computing.
4. SYSTEM WORKFLOW
Security Model
In our scheme, cloud serversand fog nodesare curious, they
execute the tasks and may collude to get the unauthorized
data. Specifically, the security model covers the following
aspects.
1) Data confidentiality: The unauthorized users which are
not the intended receivers defined by data owner should be
prevented from accessing the data.
2) Fine-grained access control: The data owner can custom
expressive and flexible policies so that the data only can be
accessed and updated by the users whose attributes satisfy
these policies.
3) Authentication: If userscould not satisfytheupdatepolicy
in cipher texts, it should also be preventedfromupdatingthe
cipher texts.
4) Collusion resistance: Two or more users cannot combine
their secret and outsourcing keys and get access to the data
they cannot access individually.
Figure 2: Work flow our scheme
5. CONCLUSION
In this paper, we put forward a secure data access control
scheme in fog computing for IoT based on CP-ABE and ABS.
The sensitive data of users are first encrypted with both
access policy and update policy, and then outsourced to
cloud serversvia fog nodes. Thus, the userswhoseattributes
meet the access policy can decrypt the cipher text. In order
to address the problem of data changes, the CSP will check
the signature, to ensure that only the users whose attributes
meet the update policy can renew the cipher text. Hence,our
scheme attains both fine-grained data access control and
secures cipher text update. Also we use decoy information
and user behavior profiling to secure data on Cloud. We
launch a disinformation attack against malicious intruder
using these two technologiesthusgiving them fake data and
keeping the original data safe and intact.
Also, our scheme provides an outsourced encryption,
decryption and signing construction by assigningmostofthe
operations to fog nodes. The comprehensive performance
analysis and experiments are performed, and the results
show that our scheme can easily handle the increasing
number of attributes, which is suitable for the resource-
constrained IoT devices in fog computing.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3484
6. REFERENCES
[1] Data collaboration in cloud computing,” in Proc.
IEEE/ACM 21st International Symposium on Quality of
Service, Montreal, QC, 2013, pp.195-200.
[2]. F. Zhao, T. Nishide, and K. Sakurai, “Realizing fine-
grained and flexible access control to outsourced data with
attribute-based cryptosystems,” in Proc. Information
Security Practice and Experience - 7th International
Conference, Guangzhou, China, 2011, pp. 83-97.
[3]J. Li, M.H. Au, W. Susilo, D. Xie, and K. Ren, “Attribute-
based signature and its applications,” in Proc. 5th
International Symposium of Information, Computer and
Communications Security, Guangzhou, China,2010, pp. 60-
69.
[4]Y. Jiang, W. Susilo, Y. Mu, and F. Guo. (2017, Jan.).Cipher
text-policy attribute-based encryption against key-
delegation abuse in fog computing. Future Generation
Computer Systems. [Online].Available:
https://doi.org/10.1016/j.future.2017.01.026
[5]L. Yeh, P. Chiang, Y. Tsai, and J. Huang. (2015, Oct.).Cloud-
based fine-grained health information access control
framework for lightweight IoT devices with dynamic
auditing and attribute revocation. IEEET transactions on
Cloud Computing. [Online]. Available:
https://doi.org/10.1109/TCC.2015. 2485199
[6]C. Zuo, J. Shao, G. Wei, M. Xie, and M. Ji. (2016, Nov.). CCA-
secure ABE with outsourced decryption for fog computing.
Future Generation Computer Systems. [Online]. Available:
https://doi.org/10.1016/j.future.2016.10.028
[7]Y. Yang, X. Zheng, and C. Tang. (2016, Nov.). Lightweight
distributed secure data management system for health
internet of things. Journal of Network and Computer
Applications. [Online]. Available: https://doi.org/ 10.1016/
j.jnca.2016.11.017
[8]A. Sahai and B. Waters, “Fuzzy identity-basedencryption,”
in Proc. 24th Annual International ConferenceontheTheory
and Applications of Cryptographic Techniques Aarhus,
Denmark, 2005, pp. 457-473.

Más contenido relacionado

La actualidad más candente

IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data TransmissionIRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data TransmissionIRJET Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET Journal
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET Journal
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoTGanesh Awati
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloudeSAT Publishing House
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

La actualidad más candente (20)

IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
Lecture 4
Lecture  4Lecture  4
Lecture 4
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data TransmissionIRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
50120140503020
5012014050302050120140503020
50120140503020
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

Similar a IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fog Computing

A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...IRJET Journal
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONIRJET Journal
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...rajender147
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...IRJET Journal
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET Journal
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingIOSR Journals
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET-  	  A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...IRJET-  	  A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...IRJET Journal
 

Similar a IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fog Computing (20)

A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
R180203114117
R180203114117R180203114117
R180203114117
 
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET-  	  A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...IRJET-  	  A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
 

Más de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate productionChinnuNinan
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 

Último (20)

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate production
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 

IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fog Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3480 Secure Data Access Control with Cipher Text and It’s Outsourcing in Fog Computing Kirti Madhavi1, Neha Bhutkar2, Pratiksha Kadu3, Babita Bhagat4 1,2,3 Student, Computer of Engineering, PHCET College, Maharashtra ,India 4 Faculty, Computer of Engineering, PHCET College, Maharashtra, India -------------------------------------------------------------------------------***-------------------------------------------------------------------------------- Abstract - In spite of the abundant advantages of storing data on cloud, Security still remains a major hurdle which needs to be conquered. The subsisting methods of protecting data on cloud have failed in preventing data theft attacks. An altered approach is carried out in our proposed system for securing the data, which is fog computing, in addition to the previous standard encryption mechanisms.Theusersusingthe Cloud are monitored and their access patterns are recorded. Every person who is trying to access the data is made to answer the security questions. Also an OTP isprovidedtoavoid shoulder sniffing of password. Fog computing is nothing but cloud computing to the extreme of the network security. It provides computation and storage services via CSP (Cloud Service Provider) to end devices in Internet of Things (IoT). Attribute-BasedEncryption (ABE) is a public key encryption scheme that allows users to encrypt and decrypt messages based on user attributes,which guarantees data confidentiality and powerful data access control. However, its computational cost for encryption and decryption phase is directly proportional to the complexity of the policies used. Key Words: Access Control, Attribute BasedEncryption, Attribute Based Signature, Cipher text-Policy Attribute Based Encryption, Cloud ServiceProvider,DataSecurity, Internet of Things, Fog Computing. 1. INTRODUCTION Today, cloud computing is considered a promising prototype of computing, since it can provide users with elastic computing resources based on shared computing techniques, virtualization, etc. However, the universality of Internet of Things (IoT) applications is changing the main factor of computing. Centralized computer systems suffer from unacceptable transmission latency andreducedsystem performance due to the extremely large volume traffic between IoT nodes and the cloud. Cloud computing is an encouraging technology that exploitsthe prototypesofcloud computing and IoT. Although the "fog computing" prototype generates many benefits, security issues, including data privacy and access control, are the same as cloud computing and information technology. In addition, they are easier to compromise and unreliable, since fog nodes are distributed at the edge of the network and cost much less than servers in the cloud. Another way to solve these problems is to encrypt user data before uploading. Attribute-based encryption(ABE)isaone- to-many cryptographic technique that meets these requirements. It hastoolsand techniquesthatprovideaccess control to the encrypted data through variousaccesspolicies and attributes referring to private keys and cryptographic texts. In particular, the ABE encryption text policy (CP-ABE) allows the data owner to define the access policy on a universe of attributes that the user must possess to decrypt the encrypted text and apply it to the data. This ensures the confidentiality and control of high-precision data access. However, existing solutions based on ABE are mainly aimed at managing secure access to data for users, few studies believe that there is no other requirement that the owner of the data you want to authenticate some usersto update data encrypted. For example, Alice hasoutsourced cryptographic data and data to the cloud, and expects only her many friends who are authorized users can renew the cryptography of the initial text. Therefore, the key update is the secure encryption text that the user renews the cipher text must be able to convince the cloud service provider (CSP), which is a valid user. The traditional approach is to sign changed data, which means that CSP shouldmaintainat the same time a list of valid public key users to verify users' identities. However, it would be a big burden to keep the list of keys, if the current number of users and CSP can know the identity of users in this way, revealing the user's privacy. A recent cryptographic technique known as based on study attributes(ABS) can help the CSP to verify if the user isvalid. In an ABS system, the user can sign messageswith a political request and its attributes. Then, with the signature, the CSP can verify the signer attributes satisfy the affirmation policy without even knowing the signer's identity. Therefore, the adoption of ABE and ABS can guarantee data privacy, detailed access control and user verification, but at the same time also implies a high computational cost in cloud computing. The encryption, decryption and signature operations of ABE and ABS require a largenumber of module exponents, which normally grow linearly withthe number of attributes in the policies. This is a significant challenge for users who access and modify data on IoT devices with limited resources with limited computing and archiving capabilities. In this paper, we propose a secure control scheme for accessing data in cloud computing for IoT. The main contributions are as follows:
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3481 1]. we propose a detailed data access control scheme with updated cryptography text based on CP-ABE and ABS in fog computing. First, the confidential data of IoT devices are encrypted with multiple policiesand then outsourced to the servers in the cloud through the nearby fog nodes. The authorized user whose attributesmeet the accesspolicy can decrypt the encryption text stored on servers in the cloud. Secondly, the authorized user can modify the decrypteddata and re-subcontract them with his signature. If the user's attributes in the signature match the update policy, cloud servers can renew the encryption text. 2]. We provide a secure outsourcing framework that outsources most encryption, decryption and signature processes from the final IoT devices to fog nodes. 2. RELATED WORKS Cloud computing is considered asa level in the middle of the cloud and end users are formed by fog nodes, such as routers, switches, etc. hardened. It is immediate for end users that servers in the cloud and some of the workloads and services that the cloud transfersto fog nodes. Fog nodes are semi-independent, aswell asnodesin the cloud anddata security would cause great concern to userswhen theystore sensitive data on cloud serversthroughfognodes.Therefore, a new access control system with cloud, fogandusersshould be considered, since the network structures and system prototypes are different, in which the fog nodesshouldserve the user to provide less computing complexity and greater flexibility for users. ABE is an encouraging cryptographic technique to provide end users with scalable, flexible and fine-grained access control. The concept of ABE was initially proposed by Sahai and Waters as a new method for fuzzy identity based encryption. ABE has two variants, the key to the ABE (KPABE) and CP-ABE policy. In fact, it becomes a powerful mechanism that can be applied to perform access control in many IoT applications. Yu et al. introduced for the first time the problem of controlling access to fine-grained data in wireless sensor networks and adopted KP-ABE to protect data. Unlike KP-ABE, CP-ABE is very suitable for access control in IoT because of its expressivenessin describingthe cryptographic text accesspolicy. Hu et al. I designedasecure data communication scheme between portable sensors and data consumers through the use of CP-ABE in wireless networks for body areas. Jiang et al. introduced a CP-ABE scheme against the abuse of key delegation in cloud computing. Yeh et al. proposed a detailed framework for controlling access to health information in the cloud for lightweight IoT devices. However, the most important drawback of theuseofABEin fog computing is the computational cost in the encryption and decryptions phase that is directly proportional to the complexity of the policy. Fog nodes, the edgeofthecloudand closer to end users, are one of the best options for outsourcing proxy, which can be used to make massive calculations to reduce the computational overhead required in IoT devices with limited resources. The main solution of the current schemes is to distribute the calculations of the CP-ABE encryption and decryption phase, so thatthelimited IoT devicescan delegate most of theconsumptionoperations to the nodes of the network. Louniset al. has designed a cloud based architecture for medical WSNs, where sensor nodes outsource cryptographic operations to a reliable gateway that encrypts CP-ABE-based data before sending it to the cloud. However, this solution adopts a completely reliable entityto perform data encryption that does not achieve the outsourcing of the practical calculation. Zuo et al. They designed a concrete ABE schemewithoutsourceddecryption for fog computing. Yang et al. proposed a concrete construction with a light computational overheadfortheIoT health system, where a semi-reliable computing center is introduced to apply most of the heavy calculations in the data encryption phase. Yang and others have proposed two multiple cloud-based ABE schemes for IoT, which allow receiversto outsource computational decoding to the cloud. However, these schemes can only support outsourced encryption or in-work decryption. Zhang et al. hasproposed an access control system for fog computing, which outsources the heavy calculation of cryptography and decoding in fog nodes, so the calculations to encrypt and decrypt are irrelevant to the number of attributes in the access policy. To perform cryptographic text update services in fog computing, the CSP must be able to verify the user's test before accepting the modified cryptographic text. ABS is an emerging signature algorithm to ensure anonymous user authentication. It wasintroduced for the first time by Majiet al. Provide authentication without revealing user identities. Based on ABS, Ruj et al. has proposed a new decentralized access control system for the secure reading and writing of data in the cloud, which supports the authentication of anonymous users. In this scheme, the cloud verifies authenticity without knowing the user's identity before storing data. His et al. proposed an expressiveschemeofABS in IoT, which usesan attribute tree to ensure that onlyauser with the appropriate attributes that meet the access policy can approve the message. However, in existing ABS works, a large computational cost is needed during the signature phase, which also grows linearly with the size of the predicate formula. Chen et al. they are the first to present two ABS outsourced schemes in which the computational load on the user's side is greatly reduced by outsourcing intensive calculations for CSP that are not reliable. Inspired by this, our schema performs anonymous authentication of the user during the update of the encryption text and delegates most of the signature operations to the fog nodes.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3482 3. SYSTEM MODEL System Model 1]. Attribute authority. The attribute authority is a fully trusted party which is in charge of generating system parameters as well as secret key for each user. 2]. CSP. The CSP is a semi-trusted party which provideshigh- capacity and online data storage service. It is also responsible for verifying the signature before accepting the updated cipher text. 3]. Fog node. The fog nodes are also semi-trusted parties which are deployed at the network edge and offer a variety of services. They are in charge of generating part of the cipher text and uploading the whole cipher text to the CSP, and also helping users to decrypt the cipher text from the CSP. Moreover, they assist end users to sign the cipher text update request. 4]. Data owner. The data owner has a great amount of data from the IoT devices to be uploaded to cloud. Itisdesignedto define access and update policies to generate the whole cipher text with the fog nodes. 5]. User. The user is attached to fog nodesandequippedwith IoT devices such as smart cameras, medical sensors and smart meters. FIGURE 1: SYSTEM MODEL SYSTEM DEFINITION We define our proposed scheme by describing the following five phases and nine algorithms. Phase 1: System setup 1) Setup 1: The attribute authority takes as input security Parameter k, and outputs the system public key (PK) and master secret key (MK). Phase 2: Key generation 2) Key Gen (PK, MK, S). The attribute authoritytakesasinput PK, MK, a set of attributes S, outputs the secret key SK forthe user. And the outsourcing key SK' is sent to fog nodes. Phase 3: Data symmetric encryption 3) Fog. Encrypt (PK, T). The fog node takes as input PK, an access policy T, outputs a partial cipher text CT’. 4) Owner. Encrypt (PK, M, Tu, CT). The data owner takes as input PK, a data M, an update policy Tu, a partial cipher text CT’, and outputs the cipher text CT. Phase 4: Data decryption 5) Fog. Decrypt (PK, CT, SK'). The fog node takes asinput PK, a cipher text CT and a user’s SK’, and outputs a partial decrypted cipher text T if the attributes satisfy access policy T. In the cipher text CT. 6) User. Decrypt (T, SK). The user takes as input a partial decrypted cipher text T and SK, then recovers the MK and outputs the plaintext M. Phase 5: Cipher text update 7) Fog. Sign (PK, U, Tu, SK’). The fog node takes asinputPK,a user’s cipher text update request U and SK’, update policy Tu. It outputs a partial signature ST' and the global key GK. 8) User. Sign (PK, ST’, SK). The user takes as input PK, a partial signature ST' and SK, outputs the signature ST. 9) Verify (Public key, ST, GK). The CSP takes as input PK, a signature ST and a global key GK. It outputs true if ST is a valid signature by the signer whose attributes satisfying Tu. The workflow of our scheme is shown in the figure. In the initialization phase, the attribute authority uses the configuration algorithm to generate the system parameter. Generating keys with the algorithm, the authority attribute generates secret keys for owners and users of the data. To
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3483 achieve high encryption efficiency, the ownerentersthedata collected first with a random DK applying a symmetric encryption algorithm and defines an access policy and a policy update, the node usesthe fog algorithm Encryptionto encrypt partially data accesspolicy, and then the dataowner uses a proprietary .Encrypt algorithm to terminate the encryption with access to the policy and policy update and stored in the CSP. When accessing data, the fog node first uses the fog algorithm. Decryption to decipher partially encrypted text, the user can use the user. Decryption algorithm to recover data. After modifying the data, the user also uses phase encryption algorithms to encrypt the updated data. Before making the final modification, the user uses the user. Join algorithm to generate the signature with the return of partial signature of fog node. Algorithm of the sign. Then, the CSP uses the Verify algorithm to verify the signature and finally accepts the updated encrypted text if the signature is true. In the end, other users can get the updated data with the decryption algorithms. Therefore, users with Think Internet devices can access and efficiently update sensitive data in fog computing. 4. SYSTEM WORKFLOW Security Model In our scheme, cloud serversand fog nodesare curious, they execute the tasks and may collude to get the unauthorized data. Specifically, the security model covers the following aspects. 1) Data confidentiality: The unauthorized users which are not the intended receivers defined by data owner should be prevented from accessing the data. 2) Fine-grained access control: The data owner can custom expressive and flexible policies so that the data only can be accessed and updated by the users whose attributes satisfy these policies. 3) Authentication: If userscould not satisfytheupdatepolicy in cipher texts, it should also be preventedfromupdatingthe cipher texts. 4) Collusion resistance: Two or more users cannot combine their secret and outsourcing keys and get access to the data they cannot access individually. Figure 2: Work flow our scheme 5. CONCLUSION In this paper, we put forward a secure data access control scheme in fog computing for IoT based on CP-ABE and ABS. The sensitive data of users are first encrypted with both access policy and update policy, and then outsourced to cloud serversvia fog nodes. Thus, the userswhoseattributes meet the access policy can decrypt the cipher text. In order to address the problem of data changes, the CSP will check the signature, to ensure that only the users whose attributes meet the update policy can renew the cipher text. Hence,our scheme attains both fine-grained data access control and secures cipher text update. Also we use decoy information and user behavior profiling to secure data on Cloud. We launch a disinformation attack against malicious intruder using these two technologiesthusgiving them fake data and keeping the original data safe and intact. Also, our scheme provides an outsourced encryption, decryption and signing construction by assigningmostofthe operations to fog nodes. The comprehensive performance analysis and experiments are performed, and the results show that our scheme can easily handle the increasing number of attributes, which is suitable for the resource- constrained IoT devices in fog computing.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3484 6. REFERENCES [1] Data collaboration in cloud computing,” in Proc. IEEE/ACM 21st International Symposium on Quality of Service, Montreal, QC, 2013, pp.195-200. [2]. F. Zhao, T. Nishide, and K. Sakurai, “Realizing fine- grained and flexible access control to outsourced data with attribute-based cryptosystems,” in Proc. Information Security Practice and Experience - 7th International Conference, Guangzhou, China, 2011, pp. 83-97. [3]J. Li, M.H. Au, W. Susilo, D. Xie, and K. Ren, “Attribute- based signature and its applications,” in Proc. 5th International Symposium of Information, Computer and Communications Security, Guangzhou, China,2010, pp. 60- 69. [4]Y. Jiang, W. Susilo, Y. Mu, and F. Guo. (2017, Jan.).Cipher text-policy attribute-based encryption against key- delegation abuse in fog computing. Future Generation Computer Systems. [Online].Available: https://doi.org/10.1016/j.future.2017.01.026 [5]L. Yeh, P. Chiang, Y. Tsai, and J. Huang. (2015, Oct.).Cloud- based fine-grained health information access control framework for lightweight IoT devices with dynamic auditing and attribute revocation. IEEET transactions on Cloud Computing. [Online]. Available: https://doi.org/10.1109/TCC.2015. 2485199 [6]C. Zuo, J. Shao, G. Wei, M. Xie, and M. Ji. (2016, Nov.). CCA- secure ABE with outsourced decryption for fog computing. Future Generation Computer Systems. [Online]. Available: https://doi.org/10.1016/j.future.2016.10.028 [7]Y. Yang, X. Zheng, and C. Tang. (2016, Nov.). Lightweight distributed secure data management system for health internet of things. Journal of Network and Computer Applications. [Online]. Available: https://doi.org/ 10.1016/ j.jnca.2016.11.017 [8]A. Sahai and B. Waters, “Fuzzy identity-basedencryption,” in Proc. 24th Annual International ConferenceontheTheory and Applications of Cryptographic Techniques Aarhus, Denmark, 2005, pp. 457-473.