Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
#1

Abstract
Cloud computing is an emerging computingparadigm in which resources of the computing infrastructureare provided as services over the Internet. As promising as it is,this paradigm also brings forth many new challenges for datasecurity and access control when users outsource sensitive datafor sharing on cloud servers, which are not within the sametrusted domain as data owners. To keep sensitive user dataconfidential against untrusted servers, existing solutions usuallyapply cryptographic methods by disclosing data decryption keysonly to authorized users. However, in doing so, these solutionsinevitably introduce a heavy computation overhead on the dataowner for key distribution and data management when finegraineddata access control is desired, and thus do not scalewell. The problem of simultaneously achieving fine-grainedness,scalability, and data confidentiality of access control actually stillremains unresolved. This paper addresses this challenging openissue by, on one hand, defining and enforcing access policies basedon data attributes, and, on the other hand, allowing the dataowner to delegate most of the computation tasks involved in finegraineddata access control to untrusted cloud servers withoutdisclosing the underlying data contents. We achieve this goal byexploiting and uniquely combining techniques of attribute-basedencryption (ABE), proxy re-encryption, and lazy re-encryption.Our proposed scheme also has salient properties of user accessprivilege confidentiality and user secret key accountability. Extensiveanalysis shows that our proposed scheme is highly efficientand provably secure under existing security models.
I. INTRODUCTION
Cloud computing is a promising computing paradigm whichrecently has drawn extensive attention from both academia andindustry. By combining a set of existing and new techniquesfrom research areas such as Service-Oriented Architectures(SOA) and virtualization, cloud computing is regarded as sucha computing paradigm in which resources in the computinginfrastructure are provided as services over the Internet. Alongwith this new paradigm, various business models are developed,which can be described by terminology of “X as aservice (XaaS)” [1] where X could be software, hardware,data storage, and etc. Successful examples are Amazon’s EC2and S3 [2], Google App Engine [3], and Microsoft Azure [4]which provide users with scalable resources in the pay-as-youusefashion at relatively low prices. For example, Amazon’s S3data storage service just charges $0.12 to $0.15 per gigabytemonth.As compared to building their own infrastructures,users are able to save their investments significantly by migratingbusinesses into the cloud. With the increasing developmentof cloud computing technologies, it is not hard to imagine thatin the near future more and more businesses will be movedinto the cloud.As promising as it is, cloud computing is also facing manychallenges that, if not well resolved, may impede its fastgrowth. Data security, as it exists in many other applications,is among these challenges that would raise great concernsfrom users when they store sensitive information on cloudservers. These concerns originate from the fact that cloudservers are usually operated by commercial providers whichare very likely to be outside of the trusted domain of the users.Data confidential against cloud servers is hence frequentlydesired when users outsource data for storage in the cloud. Insome practical application systems, data confidentiality is notonly a security/privacy issue, but also of juristic concerns. Forexample, in healthcare application scenarios use and disclosureof protected health information (PHI) should meet the requirementsof Health Insurance Portability and Accountability Act(HIPAA) [5], and keeping user data confidential against thestorage servers is not just an option, but a requirement.Furthermore, we observe that there are also cases in whichcloud users themselves are content providers. They publishdata on cloud servers for sharing and need fine-grained dataaccess control in terms of which user (data consumer) has theaccess privilege to which types of data. In the healthcare case,for example, a medical center would be the data owner whostores millions of healthcare records in the cloud. It wouldallow data consumers such as doctors, patients, researchersand etc, to access various types of healthcare records underpolicies admitted by HIPAA. To enforce these access policies,the data owners on one hand would like to take advantage ofthe abundant resources that the cloud provides for efficiencyand economy; on the other hand, they may want to keep thedata contents confidential against cloud servers.As a significant research area for system protection, dataaccess control has been evolving in the past thirty years andvarious techniques [6]–[9] have been developed to effectivelyimplement fine-grained access control, which allows flexibilityin specifying differential access rights of individual users. Traditionalaccess control architectures usually assume the dataowner and the servers storing the data are in the same trusteddomain, where the servers are fully entrusted as an omniscientreference monitor [10] responsible for defining and enforcingaccess control policies. This assumption however no longerholds in cloud computing since the data owner and cloudservers are very likely to be in two different domains.


Download full report
http://chennaisundayieee%202010/Achieving%20Secure,%20Scalable,%20and%20Fine-grained%20Data%20Access%20Control%20in%20Cloud%20Computing.pdf
Reply
#2


to get information about the topic "achieving secure scalable and fine grained data access control in cloud computing" full report ppt and related topic refer the page link bellow

http://studentbank.in/report-achieving-s...-computing

http://studentbank.in/report-achieving-s...ing--23161
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar report on fine bllanking pdf, querybased fine grained page rank, fine finshing process, achieving secure scalable and fine grained data access control in cloud computing project source co, abstract fine wall, masters in fine arts new, dean of college of fine,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Grid Computing seminars report Information Technology 35 41,899 21-12-2012, 10:55 AM
Last Post: seminar details
  Types of Distributed Computing computer girl 1 1,607 30-08-2012, 03:00 PM
Last Post: elizabeth35
  LOSSLESS DATA COMPRESSION ALGORITHMS seminar class 1 2,696 01-03-2012, 11:42 AM
Last Post: seminar paper
  ROBOTIC SURGERY AND TELE-SURGERY: BASIC PRINCIPLES AND DESCRIPTION OF A NOVEL CONCEPT projectsofme 1 2,867 27-02-2012, 01:12 PM
Last Post: seminar paper
  Modular Computing computer science crazy 2 4,028 27-01-2012, 09:45 AM
Last Post: seminar addict
  holographic data storage full report computer science technology 19 23,567 27-01-2012, 09:14 AM
Last Post: seminar addict
  AMAZON ELASTIC CLOUD COMPUTING seminar class 1 2,776 20-01-2012, 10:12 AM
Last Post: seminar addict
  File Organization Techniques Record Access Methods Data Structures projectsofme 1 3,300 09-01-2012, 10:44 AM
Last Post: project uploader
  SECURE COGNITIVE MOBILE HOTSPOT seminar class 2 3,053 08-08-2011, 09:54 AM
Last Post: seminar addict
  Unicode And Multilingual Computing computer science crazy 8 6,355 30-07-2011, 09:58 AM
Last Post: glitson

Forum Jump: