Ex-HABE with User Accountability for Secure Access Control in Cloud

Main Article Content

Nilesh S. Jadhav, Ms. D. A. Chaudhari

Abstract

Data outsourcing is becoming a useful and feasible paradigm with the rapid application of service-oriented technologies. Many researchers have tried combination of access control and cryptography to propose a model to protect sensitive information in this outsourcing scenario. However, these combinations in existing approaches have difficulty in key management and key distribution when fine-grained data access is required. Taking the complexity of fine-grained access control policy and the wide-reaching users of cloud in account, this issue would become extremely difficult to iron out. Various system models using attribute-based encryption (ABE) have been proposed however, most of them suffer from heavy overhead in implementing the access control policies. In this paper, a system is proposed with extended hierarchical attribute-based encryption (HABE) by using ciphertext-policy attribute-based encryption (ABE). It uses the hierarchical structure of users and bilinear mapping for generating the keys for various data handlers. Also the system focuses on user tracking by allocating an unique id to user. The system uses traitor tracing along with separation of duty made available by HABE and reduces the scope of key abuse. It is formally proved extended HABE with traitor tracing adds on to user accountability if user tracking for resource is maintained for hierarchical systems.
DOI: 10.17762/ijritcc2321-8169.160424

Article Details

How to Cite
, N. S. J. M. D. A. C. (2015). Ex-HABE with User Accountability for Secure Access Control in Cloud. International Journal on Recent and Innovation Trends in Computing and Communication, 3(4), 1848–1853. https://doi.org/10.17762/ijritcc.v3i4.4140
Section
Articles