0% found this document useful (0 votes)
81 views4 pages

HASBE: A Hierarchical Attribute-Based Solution For Flexible and Scalable Access Control in Cloud Computing

The document proposes a hierarchical attribute-set-based encryption (HASBE) scheme to address access control issues in cloud computing. HASBE extends cipher text-policy attribute-set-based encryption with a hierarchical user structure to achieve scalable, flexible and fine-grained access control. It inherits advantages of efficient revocation from attribute-set-based encryption and incorporates a hierarchical user structure through delegation. The document outlines existing access control issues, the proposed HASBE scheme, and its security proof and performance evaluation through implementation and experiments.

Uploaded by

Murali Vannappan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views4 pages

HASBE: A Hierarchical Attribute-Based Solution For Flexible and Scalable Access Control in Cloud Computing

The document proposes a hierarchical attribute-set-based encryption (HASBE) scheme to address access control issues in cloud computing. HASBE extends cipher text-policy attribute-set-based encryption with a hierarchical user structure to achieve scalable, flexible and fine-grained access control. It inherits advantages of efficient revocation from attribute-set-based encryption and incorporates a hierarchical user structure through delegation. The document outlines existing access control issues, the proposed HASBE scheme, and its security proof and performance evaluation through implementation and experiments.

Uploaded by

Murali Vannappan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

HASBE: A Hierarchical Attribute-Based Solution for

Flexible and Scalable


Access Control in Cloud Computing

ABSTRACT

Cloud computing has emerged as one of the most important


paradigms in the IT industry in recent years. Since this new computing technology
requires users to trust their valuable data to cloud providers, there have been
increasing security and privacy concerns on outsourced data. Several schemes
employing attribute-based encryption (ABE) have been designed for access control
of outsourced data in cloud computing; however, most of them suffer from
hardness in implementing complex access control policies.

EXISTING SYSTEM

One of the major security concerns is data security and


privacy in cloud computing due to its Internet- based data storage and
management. In cloud computing, users have to give up their data to the cloud
service provider for storage and business operations, while the cloud service
provider is usually a profitable enterprise which cannot be totally trusted. Data
represents an extremely important benefit for any organization, and enterprise
users will face serious confidentiality if its confidential data is disclosed to their
business competitors or the public.
Disadvantage:

 The cloud service provider is usually a commercial enterprise which cannot


be totally trusted.
 Data represents a extreme important asset for any organization, and
enterprise users will face serious consequences
 Hacking of data is possible to third parties.

PROPOSED SYSTEM

We propose a hierarchical attribute-set-based encryption


(HASBE) scheme for access control in cloud computing. HASBE extends the
cipher text-policy attribute-set-based encryption scheme with a hierarchical
structure of system users, so as to achieve scalable, flexible and fine-grained access
control.
We formally prove the security of the proposed scheme based on the security of the
CP-ABE scheme by Bettencourt and evaluate its performance in terms of
computational overhead. Lastly, we implement HASBE and conduct complete
experiments for performance evaluation, and our experiment demonstrate that
HASBE has fitting performance.

Advantage:

 HASBE inherits the advantage of ASBE in efficient user revocation.


 The HASBE scheme flawlessly incorporates a hierarchical structure of
system users by applying a delegation algorithm to ASBE.
 We formally proved security for HASBE through CP-ABE.
 HASBE supports multiple value assignment for each attributes.
FUTURE ENHANCEMENT

We formally proved the security of HASBE based


on the security of CP-ABE by Bettencourt. Finally, we implemented the proposed
scheme, and conducted comprehensive performance analysis and evaluation,
which showed its efficiency and advantages over existing schemes.

SYSTEM SPECIFICATION

HARDWARE SPECIFICATION:

The hardware used for the development of the project is:

PROCESSOR : PENTIUM III 866 MHz

RAM : 128 MD SD RAM

HARD DISK : 20 GB

SOFTWARE SPECIFICATION:

The software used for the development of the project is:

OPERATING SYSTEM : Windows 2000 Professional

ENVIRONMENT : Visual Studio .NET 2003/asp .Net

.NET FRAMEWORK : Version 1.1

LANGUAGE : C#.NET

WEB TECHNOLOGY : Active Server Pages.NET

WEB SERVER : Internet Information Server 5.0

REPORTS : Web Form Data Grid control


BACK END : MS-SQL-Server 2005

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy