HASBE: A Hierarchical Attribute Set Based Encryption For Flexible, Scalable And Fine Grained Access Control In Cloud Computing
||International Journal of Computer & Organization Trends (IJCOT)||
|© 2013 by IJCOT Journal|
|Year of Publication : 2013|
|Authors : N.krishna , L.Bhavani|
N.krishna , L.Bhavani . "HASBE: A Hierarchical Attribute Set Based Encryption For Flexible, Scalable And Fine Grained Access Control In Cloud Computing " . International Journal of Computer & organization Trends (IJ COT), V3(5):36-39 Sep - Oct 2013, ISSN 2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.
At present cloud computing is going to be very famous technology in IT enterprises. For a company, the data stored is huge and it is very precious. All functions are performed through networks. Thus, it becomes very important to have the secured use of data. In cloud computing, the ultimate important concerns of security are data security and confidentiality, and also flexible and scalable, fine grained access control must be keep in the cloud systems. Attribute based encryption (ABE), allows for rare access control on encrypted data. In its key policy extract, the primitive enables senders to encrypt messages under a set of attributes and private keys are associated with access structures that specify which cipher texts the key holder will be allowed to decrypt .we propose the Hierarchical Attribute Set Based Encryption (HASBE) to develop a new security feature for various organizational platforms. It is implemented using cipher text policy by encrypting and decrypting the data in the cloud so that the cloud system becomes more scalable and flexible by enforcing data owners to share their data with data consumers controlled by the domain authority.
 R. Buyya, C. ShinYeo, J. Broberg, and I. Brandic, “Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Generation Comput. Syst., vol. 25
 B. Barbara, “Salesforce.com: Raising the level of networking,” Inf. Today, vol. 27, pp. 45–45, 2010.
 T. Yu and M. Winslett, “A unified scheme for resource protection in automated trust negotiation,” in Proc. IEEE Symp. Security and Privacy, Berkeley, CA, 2003.
 J. Li, N. Li, and W. H. Winsborough, “Automated trust negotiation using cryptographic credentials,” in Proc. ACMConf. Computer and Communications Security (CCS), Alexandria, VA, 2005
 A. Ross, “Technical perspective: A chilly sense of security,” Commun. ACM, vol. 52, pp. 90–90, 2009.
 D. E. Bell and L. J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation The MITRE Corporation, Tech. Rep., 1976.
 K. J. Biba, Integrity Considerations for Secure Computer Systems The MITRE Corporation, Tech. Rep., 1977.
 H. Harney, A. Colgrove, and P. D. McDaniel, “Principles of policy in secure groups,” in Proc. NDSS, San Diego, CA, 2001.
R. Bobba, H. Khurana, and M. Prabhakaran, “Attribute-sets: A practically motivated enhancement to attribute-based encryption,” in Proc.ESORICS, Saint Malo, France, 2009.
 A. Sahai and B. Waters, “Fuzzy identity based encryption,” in Proc.Acvancesin Cryptology—Eurocrypt, 2005, vol. 3494, LNCS, pp. 457–473.
 G.Wang, Q. Liu, and J.Wu, “Hierachical attibute-based encryption for fine-grained access control in cloud storage services,” in Proc. ACMConf. Computer and Communications Security(ACM CCS), Chicago,
T. Yu and M. Winslett, “A unified scheme for resource protection in automated trust negotiation,” in Proc. IEEE Symp. Security and Privacy, Berkeley, CA, 2003.
 J. Li, N. Li, and W. H. Winsborough, “Automated trust negotiation using cryptographic credentials,” in Proc. ACM Conf. Computer andCommunications Security (CCS),Alexandria, VA, 2005.
 V. Goyal, O. Pandey, A. Sahai, and B.Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf.Computer and Communications Security (ACMCCS), Alexandria,
 Zhiguo Wan, Jun’e Liu, and Robert H. Deng, “HASBE: A Hierearchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing.
Access control, cloud computing, data security.