Cloud Security-Random Attribute Based Encryption
Cloud computing, to reduce the capital and operational costs, shares computing resources rather than establishing local servers to handle applications. But Cloud computing could not take off because of security issues. Major challenges in building a secure and trustworthy cloud system are: Outsourcing (don’t know where your servers are, how many copies of your data are kept and who all have access to your data physically and programmatically), Multi-tenancy (What type of programs are running along with your program on the same virtual machine), and massive shared physical and logical storage, computing power and bandwidth over internet. The traditional security mechanisms like PKI, RSA, DES etc. are not suitable for Cloud data as the keys can be deciphered (The minimum key length has increased from 32 bits to 512 bits today). This paper proposes a novel encryption technique where the key for each segment (row or tuple) of data is changed to a part (attribute value) of the data itself. This mechanism makes sure that no person can decrypt the data without having access to the Key Attribute Table, which is stored on a local server or in a different cloud.
KeywordsCloud PKI RSA DES Encryption Security
- 1.Krešimir Popović, Željko Hocenski “Cloud computing security issues and challenges” Institute of Automation and Process Computing.Google Scholar
- 2.Mohit Marwaha, Rajeev Bedi “Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing” IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013.Google Scholar
- 3.Parmar Vipul Kumar J, RajaniKanth Aluvalu “Key Policy Attribute Based Encryption (KPABE): A Review” International Journal of Innovative and Emerging Research in Engineering Vol. 2, Issue 2, 2015.Google Scholar
- 4.Minu George, Dr. C. Suresh Gnanadhas, Saranya. K “A Survey on Attribute Based Encryption Scheme in Cloud Computing” International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 11, November 2013.Google Scholar