Enviar búsqueda
Cargar
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fog Computing
•
0 recomendaciones
•
9 vistas
IRJET Journal
Seguir
https://www.irjet.net/archives/V5/i3/IRJET-V5I3821.pdf
Leer menos
Leer más
Ingeniería
Denunciar
Compartir
Denunciar
Compartir
1 de 5
Descargar ahora
Descargar para leer sin conexión
Recomendados
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
Deep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of Things
ijtsrd
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
2013 14-dotnet-titles-pantech-proed-for-me-mtech
2013 14-dotnet-titles-pantech-proed-for-me-mtech
Pantech ProEd Pvt Ltd
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
Recomendados
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
Deep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of Things
ijtsrd
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
2013 14-dotnet-titles-pantech-proed-for-me-mtech
2013 14-dotnet-titles-pantech-proed-for-me-mtech
Pantech ProEd Pvt Ltd
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
Lecture 10
Lecture 10
vishal choudhary
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
Lecture 4
Lecture 4
vishal choudhary
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET Journal
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET Journal
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET Journal
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
eSAT Publishing House
15CS81 Module1 IoT
15CS81 Module1 IoT
Ganesh Awati
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET Journal
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
eSAT Journals
50120140503020
50120140503020
IAEME Publication
Comparison of data security in grid and cloud
Comparison of data security in grid and cloud
eSAT Publishing House
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET Journal
Lecture 15
Lecture 15
vishal choudhary
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
IRJET Journal
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
Más contenido relacionado
La actualidad más candente
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
Lecture 10
Lecture 10
vishal choudhary
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
Lecture 4
Lecture 4
vishal choudhary
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET Journal
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET Journal
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET Journal
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
eSAT Publishing House
15CS81 Module1 IoT
15CS81 Module1 IoT
Ganesh Awati
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET Journal
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET Journal
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
eSAT Journals
50120140503020
50120140503020
IAEME Publication
Comparison of data security in grid and cloud
Comparison of data security in grid and cloud
eSAT Publishing House
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET Journal
Lecture 15
Lecture 15
vishal choudhary
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
La actualidad más candente
(20)
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
Lecture 10
Lecture 10
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Lecture 4
Lecture 4
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
15CS81 Module1 IoT
15CS81 Module1 IoT
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
50120140503020
50120140503020
Comparison of data security in grid and cloud
Comparison of data security in grid and cloud
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
Lecture 15
Lecture 15
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
Similar a IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fog Computing
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
IRJET Journal
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET Journal
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
IRJET Journal
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
rajender147
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
IRJET Journal
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
IRJET Journal
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
IJSRD
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
IOSR Journals
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
R180203114117
R180203114117
IOSR Journals
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET Journal
Similar a IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fog Computing
(20)
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
R180203114117
R180203114117
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
IRJET- A Lightweight Protected Data Sharing Method for Mobile Cloud Compu...
Más de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Más de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Último
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
Main Memory Management in Operating System
Main Memory Management in Operating System
Rashmi Bhat
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Sumanth A
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
sahilsajad201
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
AkritiPradhan2
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
isabel213075
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Deepika Walanjkar
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
sandhya757531
Virtual memory management in Operating System
Virtual memory management in Operating System
Rashmi Bhat
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
ChristianCDAM
Earthing details of Electrical Substation
Earthing details of Electrical Substation
stephanwindworld
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
BootNeck1
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
Erbil Polytechnic University
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
Romil Mishra
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
Manicka Mamallan Andavar
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
NainaShrivastava14
Crushers to screens in aggregate production
Crushers to screens in aggregate production
ChinnuNinan
Input Output Management in Operating System
Input Output Management in Operating System
Rashmi Bhat
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
Erbil Polytechnic University
Último
(20)
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
Main Memory Management in Operating System
Main Memory Management in Operating System
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
Virtual memory management in Operating System
Virtual memory management in Operating System
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Earthing details of Electrical Substation
Earthing details of Electrical Substation
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Crushers to screens in aggregate production
Crushers to screens in aggregate production
Input Output Management in Operating System
Input Output Management in Operating System
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fog Computing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3480 Secure Data Access Control with Cipher Text and It’s Outsourcing in Fog Computing Kirti Madhavi1, Neha Bhutkar2, Pratiksha Kadu3, Babita Bhagat4 1,2,3 Student, Computer of Engineering, PHCET College, Maharashtra ,India 4 Faculty, Computer of Engineering, PHCET College, Maharashtra, India -------------------------------------------------------------------------------***-------------------------------------------------------------------------------- Abstract - In spite of the abundant advantages of storing data on cloud, Security still remains a major hurdle which needs to be conquered. The subsisting methods of protecting data on cloud have failed in preventing data theft attacks. An altered approach is carried out in our proposed system for securing the data, which is fog computing, in addition to the previous standard encryption mechanisms.Theusersusingthe Cloud are monitored and their access patterns are recorded. Every person who is trying to access the data is made to answer the security questions. Also an OTP isprovidedtoavoid shoulder sniffing of password. Fog computing is nothing but cloud computing to the extreme of the network security. It provides computation and storage services via CSP (Cloud Service Provider) to end devices in Internet of Things (IoT). Attribute-BasedEncryption (ABE) is a public key encryption scheme that allows users to encrypt and decrypt messages based on user attributes,which guarantees data confidentiality and powerful data access control. However, its computational cost for encryption and decryption phase is directly proportional to the complexity of the policies used. Key Words: Access Control, Attribute BasedEncryption, Attribute Based Signature, Cipher text-Policy Attribute Based Encryption, Cloud ServiceProvider,DataSecurity, Internet of Things, Fog Computing. 1. INTRODUCTION Today, cloud computing is considered a promising prototype of computing, since it can provide users with elastic computing resources based on shared computing techniques, virtualization, etc. However, the universality of Internet of Things (IoT) applications is changing the main factor of computing. Centralized computer systems suffer from unacceptable transmission latency andreducedsystem performance due to the extremely large volume traffic between IoT nodes and the cloud. Cloud computing is an encouraging technology that exploitsthe prototypesofcloud computing and IoT. Although the "fog computing" prototype generates many benefits, security issues, including data privacy and access control, are the same as cloud computing and information technology. In addition, they are easier to compromise and unreliable, since fog nodes are distributed at the edge of the network and cost much less than servers in the cloud. Another way to solve these problems is to encrypt user data before uploading. Attribute-based encryption(ABE)isaone- to-many cryptographic technique that meets these requirements. It hastoolsand techniquesthatprovideaccess control to the encrypted data through variousaccesspolicies and attributes referring to private keys and cryptographic texts. In particular, the ABE encryption text policy (CP-ABE) allows the data owner to define the access policy on a universe of attributes that the user must possess to decrypt the encrypted text and apply it to the data. This ensures the confidentiality and control of high-precision data access. However, existing solutions based on ABE are mainly aimed at managing secure access to data for users, few studies believe that there is no other requirement that the owner of the data you want to authenticate some usersto update data encrypted. For example, Alice hasoutsourced cryptographic data and data to the cloud, and expects only her many friends who are authorized users can renew the cryptography of the initial text. Therefore, the key update is the secure encryption text that the user renews the cipher text must be able to convince the cloud service provider (CSP), which is a valid user. The traditional approach is to sign changed data, which means that CSP shouldmaintainat the same time a list of valid public key users to verify users' identities. However, it would be a big burden to keep the list of keys, if the current number of users and CSP can know the identity of users in this way, revealing the user's privacy. A recent cryptographic technique known as based on study attributes(ABS) can help the CSP to verify if the user isvalid. In an ABS system, the user can sign messageswith a political request and its attributes. Then, with the signature, the CSP can verify the signer attributes satisfy the affirmation policy without even knowing the signer's identity. Therefore, the adoption of ABE and ABS can guarantee data privacy, detailed access control and user verification, but at the same time also implies a high computational cost in cloud computing. The encryption, decryption and signature operations of ABE and ABS require a largenumber of module exponents, which normally grow linearly withthe number of attributes in the policies. This is a significant challenge for users who access and modify data on IoT devices with limited resources with limited computing and archiving capabilities. In this paper, we propose a secure control scheme for accessing data in cloud computing for IoT. The main contributions are as follows:
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3481 1]. we propose a detailed data access control scheme with updated cryptography text based on CP-ABE and ABS in fog computing. First, the confidential data of IoT devices are encrypted with multiple policiesand then outsourced to the servers in the cloud through the nearby fog nodes. The authorized user whose attributesmeet the accesspolicy can decrypt the encryption text stored on servers in the cloud. Secondly, the authorized user can modify the decrypteddata and re-subcontract them with his signature. If the user's attributes in the signature match the update policy, cloud servers can renew the encryption text. 2]. We provide a secure outsourcing framework that outsources most encryption, decryption and signature processes from the final IoT devices to fog nodes. 2. RELATED WORKS Cloud computing is considered asa level in the middle of the cloud and end users are formed by fog nodes, such as routers, switches, etc. hardened. It is immediate for end users that servers in the cloud and some of the workloads and services that the cloud transfersto fog nodes. Fog nodes are semi-independent, aswell asnodesin the cloud anddata security would cause great concern to userswhen theystore sensitive data on cloud serversthroughfognodes.Therefore, a new access control system with cloud, fogandusersshould be considered, since the network structures and system prototypes are different, in which the fog nodesshouldserve the user to provide less computing complexity and greater flexibility for users. ABE is an encouraging cryptographic technique to provide end users with scalable, flexible and fine-grained access control. The concept of ABE was initially proposed by Sahai and Waters as a new method for fuzzy identity based encryption. ABE has two variants, the key to the ABE (KPABE) and CP-ABE policy. In fact, it becomes a powerful mechanism that can be applied to perform access control in many IoT applications. Yu et al. introduced for the first time the problem of controlling access to fine-grained data in wireless sensor networks and adopted KP-ABE to protect data. Unlike KP-ABE, CP-ABE is very suitable for access control in IoT because of its expressivenessin describingthe cryptographic text accesspolicy. Hu et al. I designedasecure data communication scheme between portable sensors and data consumers through the use of CP-ABE in wireless networks for body areas. Jiang et al. introduced a CP-ABE scheme against the abuse of key delegation in cloud computing. Yeh et al. proposed a detailed framework for controlling access to health information in the cloud for lightweight IoT devices. However, the most important drawback of theuseofABEin fog computing is the computational cost in the encryption and decryptions phase that is directly proportional to the complexity of the policy. Fog nodes, the edgeofthecloudand closer to end users, are one of the best options for outsourcing proxy, which can be used to make massive calculations to reduce the computational overhead required in IoT devices with limited resources. The main solution of the current schemes is to distribute the calculations of the CP-ABE encryption and decryption phase, so thatthelimited IoT devicescan delegate most of theconsumptionoperations to the nodes of the network. Louniset al. has designed a cloud based architecture for medical WSNs, where sensor nodes outsource cryptographic operations to a reliable gateway that encrypts CP-ABE-based data before sending it to the cloud. However, this solution adopts a completely reliable entityto perform data encryption that does not achieve the outsourcing of the practical calculation. Zuo et al. They designed a concrete ABE schemewithoutsourceddecryption for fog computing. Yang et al. proposed a concrete construction with a light computational overheadfortheIoT health system, where a semi-reliable computing center is introduced to apply most of the heavy calculations in the data encryption phase. Yang and others have proposed two multiple cloud-based ABE schemes for IoT, which allow receiversto outsource computational decoding to the cloud. However, these schemes can only support outsourced encryption or in-work decryption. Zhang et al. hasproposed an access control system for fog computing, which outsources the heavy calculation of cryptography and decoding in fog nodes, so the calculations to encrypt and decrypt are irrelevant to the number of attributes in the access policy. To perform cryptographic text update services in fog computing, the CSP must be able to verify the user's test before accepting the modified cryptographic text. ABS is an emerging signature algorithm to ensure anonymous user authentication. It wasintroduced for the first time by Majiet al. Provide authentication without revealing user identities. Based on ABS, Ruj et al. has proposed a new decentralized access control system for the secure reading and writing of data in the cloud, which supports the authentication of anonymous users. In this scheme, the cloud verifies authenticity without knowing the user's identity before storing data. His et al. proposed an expressiveschemeofABS in IoT, which usesan attribute tree to ensure that onlyauser with the appropriate attributes that meet the access policy can approve the message. However, in existing ABS works, a large computational cost is needed during the signature phase, which also grows linearly with the size of the predicate formula. Chen et al. they are the first to present two ABS outsourced schemes in which the computational load on the user's side is greatly reduced by outsourcing intensive calculations for CSP that are not reliable. Inspired by this, our schema performs anonymous authentication of the user during the update of the encryption text and delegates most of the signature operations to the fog nodes.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3482 3. SYSTEM MODEL System Model 1]. Attribute authority. The attribute authority is a fully trusted party which is in charge of generating system parameters as well as secret key for each user. 2]. CSP. The CSP is a semi-trusted party which provideshigh- capacity and online data storage service. It is also responsible for verifying the signature before accepting the updated cipher text. 3]. Fog node. The fog nodes are also semi-trusted parties which are deployed at the network edge and offer a variety of services. They are in charge of generating part of the cipher text and uploading the whole cipher text to the CSP, and also helping users to decrypt the cipher text from the CSP. Moreover, they assist end users to sign the cipher text update request. 4]. Data owner. The data owner has a great amount of data from the IoT devices to be uploaded to cloud. Itisdesignedto define access and update policies to generate the whole cipher text with the fog nodes. 5]. User. The user is attached to fog nodesandequippedwith IoT devices such as smart cameras, medical sensors and smart meters. FIGURE 1: SYSTEM MODEL SYSTEM DEFINITION We define our proposed scheme by describing the following five phases and nine algorithms. Phase 1: System setup 1) Setup 1: The attribute authority takes as input security Parameter k, and outputs the system public key (PK) and master secret key (MK). Phase 2: Key generation 2) Key Gen (PK, MK, S). The attribute authoritytakesasinput PK, MK, a set of attributes S, outputs the secret key SK forthe user. And the outsourcing key SK' is sent to fog nodes. Phase 3: Data symmetric encryption 3) Fog. Encrypt (PK, T). The fog node takes as input PK, an access policy T, outputs a partial cipher text CT’. 4) Owner. Encrypt (PK, M, Tu, CT). The data owner takes as input PK, a data M, an update policy Tu, a partial cipher text CT’, and outputs the cipher text CT. Phase 4: Data decryption 5) Fog. Decrypt (PK, CT, SK'). The fog node takes asinput PK, a cipher text CT and a user’s SK’, and outputs a partial decrypted cipher text T if the attributes satisfy access policy T. In the cipher text CT. 6) User. Decrypt (T, SK). The user takes as input a partial decrypted cipher text T and SK, then recovers the MK and outputs the plaintext M. Phase 5: Cipher text update 7) Fog. Sign (PK, U, Tu, SK’). The fog node takes asinputPK,a user’s cipher text update request U and SK’, update policy Tu. It outputs a partial signature ST' and the global key GK. 8) User. Sign (PK, ST’, SK). The user takes as input PK, a partial signature ST' and SK, outputs the signature ST. 9) Verify (Public key, ST, GK). The CSP takes as input PK, a signature ST and a global key GK. It outputs true if ST is a valid signature by the signer whose attributes satisfying Tu. The workflow of our scheme is shown in the figure. In the initialization phase, the attribute authority uses the configuration algorithm to generate the system parameter. Generating keys with the algorithm, the authority attribute generates secret keys for owners and users of the data. To
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3483 achieve high encryption efficiency, the ownerentersthedata collected first with a random DK applying a symmetric encryption algorithm and defines an access policy and a policy update, the node usesthe fog algorithm Encryptionto encrypt partially data accesspolicy, and then the dataowner uses a proprietary .Encrypt algorithm to terminate the encryption with access to the policy and policy update and stored in the CSP. When accessing data, the fog node first uses the fog algorithm. Decryption to decipher partially encrypted text, the user can use the user. Decryption algorithm to recover data. After modifying the data, the user also uses phase encryption algorithms to encrypt the updated data. Before making the final modification, the user uses the user. Join algorithm to generate the signature with the return of partial signature of fog node. Algorithm of the sign. Then, the CSP uses the Verify algorithm to verify the signature and finally accepts the updated encrypted text if the signature is true. In the end, other users can get the updated data with the decryption algorithms. Therefore, users with Think Internet devices can access and efficiently update sensitive data in fog computing. 4. SYSTEM WORKFLOW Security Model In our scheme, cloud serversand fog nodesare curious, they execute the tasks and may collude to get the unauthorized data. Specifically, the security model covers the following aspects. 1) Data confidentiality: The unauthorized users which are not the intended receivers defined by data owner should be prevented from accessing the data. 2) Fine-grained access control: The data owner can custom expressive and flexible policies so that the data only can be accessed and updated by the users whose attributes satisfy these policies. 3) Authentication: If userscould not satisfytheupdatepolicy in cipher texts, it should also be preventedfromupdatingthe cipher texts. 4) Collusion resistance: Two or more users cannot combine their secret and outsourcing keys and get access to the data they cannot access individually. Figure 2: Work flow our scheme 5. CONCLUSION In this paper, we put forward a secure data access control scheme in fog computing for IoT based on CP-ABE and ABS. The sensitive data of users are first encrypted with both access policy and update policy, and then outsourced to cloud serversvia fog nodes. Thus, the userswhoseattributes meet the access policy can decrypt the cipher text. In order to address the problem of data changes, the CSP will check the signature, to ensure that only the users whose attributes meet the update policy can renew the cipher text. Hence,our scheme attains both fine-grained data access control and secures cipher text update. Also we use decoy information and user behavior profiling to secure data on Cloud. We launch a disinformation attack against malicious intruder using these two technologiesthusgiving them fake data and keeping the original data safe and intact. Also, our scheme provides an outsourced encryption, decryption and signing construction by assigningmostofthe operations to fog nodes. The comprehensive performance analysis and experiments are performed, and the results show that our scheme can easily handle the increasing number of attributes, which is suitable for the resource- constrained IoT devices in fog computing.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3484 6. REFERENCES [1] Data collaboration in cloud computing,” in Proc. IEEE/ACM 21st International Symposium on Quality of Service, Montreal, QC, 2013, pp.195-200. [2]. F. Zhao, T. Nishide, and K. Sakurai, “Realizing fine- grained and flexible access control to outsourced data with attribute-based cryptosystems,” in Proc. Information Security Practice and Experience - 7th International Conference, Guangzhou, China, 2011, pp. 83-97. [3]J. Li, M.H. Au, W. Susilo, D. Xie, and K. Ren, “Attribute- based signature and its applications,” in Proc. 5th International Symposium of Information, Computer and Communications Security, Guangzhou, China,2010, pp. 60- 69. [4]Y. Jiang, W. Susilo, Y. Mu, and F. Guo. (2017, Jan.).Cipher text-policy attribute-based encryption against key- delegation abuse in fog computing. Future Generation Computer Systems. [Online].Available: https://doi.org/10.1016/j.future.2017.01.026 [5]L. Yeh, P. Chiang, Y. Tsai, and J. Huang. (2015, Oct.).Cloud- based fine-grained health information access control framework for lightweight IoT devices with dynamic auditing and attribute revocation. IEEET transactions on Cloud Computing. [Online]. Available: https://doi.org/10.1109/TCC.2015. 2485199 [6]C. Zuo, J. Shao, G. Wei, M. Xie, and M. Ji. (2016, Nov.). CCA- secure ABE with outsourced decryption for fog computing. Future Generation Computer Systems. [Online]. Available: https://doi.org/10.1016/j.future.2016.10.028 [7]Y. Yang, X. Zheng, and C. Tang. (2016, Nov.). Lightweight distributed secure data management system for health internet of things. Journal of Network and Computer Applications. [Online]. Available: https://doi.org/ 10.1016/ j.jnca.2016.11.017 [8]A. Sahai and B. Waters, “Fuzzy identity-basedencryption,” in Proc. 24th Annual International ConferenceontheTheory and Applications of Cryptographic Techniques Aarhus, Denmark, 2005, pp. 457-473.
Descargar ahora