Privacy Preserving Policy Based Content Sharing in Public Clouds - 2013


An important problem in public clouds is how to selectively share documents based on fine-grained attribute-based access control policies (acps). An approach is to encrypt documents satisfying different policies with different keys using a public key cryptosystem such as attribute-based encryption, and/or proxy re-encryption. However, such an approach has some weaknesses: it cannot efficiently handle adding/revoking users or identity attributes, and policy changes; it requires to keep multiple encrypted copies of the same documents; it incurs high computational costs. A direct application of a symmetric key cryptosystem, where users are grouped based on the policies they satisfy and unique keys are assigned to each group, also has similar weaknesses. We observe that, without utilizing public key cryptography and by allowing users to dynamically derive the symmetric keys at the time of decryption, one can address the above weaknesses. Based on this idea, we formalize a new key management scheme, called broadcast group key management (BGKM), and then give a secure construction of a BGKM scheme called ACV-BGKM. The idea is to give some secrets to users based on the identity attributes they have and later allow them to derive actual symmetric keys based on their secrets and some public information. A key advantage of the BGKM scheme is that adding users/revoking users or updating acps can be performed efficiently by updating only some public information. Using our BGKM construct, we propose an efficient approach for fine-grained encryption-based access control for documents stored in an untrusted cloud file storage.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks ABSTRACT: Location privacy can be achieved through the use of mechanisms that are built on geo-indistinguishability. These
PROJECT TITLE : Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data ABSTRACT: Cloud computing and big data have quickly become the most popular forms of computing and data resources because of their ability
PROJECT TITLE : Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing ABSTRACT: Computing at the network's edge, also known as edge computing, processes data locally rather than sending
PROJECT TITLE : Efficient Privacy-preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain ABSTRACT: Signal processing in an encrypted domain is a potential tool that could protect sensitive signals from untrusted
PROJECT TITLE : More Than Privacy Applying Differential Privacy in Key Areas of Artificial Intelligence ABSTRACT: In recent years, there has been a lot of interest in the field of artificial intelligence, also known as AI. However,

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry