Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary


Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

An Encryption Scheme Based on Peculiarity For an Ordered File Hierarchy in Cloud Computing

Ms.Faiqa Mateen, Mr. Mohammed Khaleel Ahmed, 3 Dr. G.S.S Rao, ,
Affiliations
Nawab ShahAlam khan College of Engineering and Technology, Hyd
:10.22362/ijcert/2017/v4/i10/xxxx [UNDER PROCESS]


Abstract
There are several issues that always occur throughout the sharing of knowledge within the cloud. To unravel this,we use a technology of encoding known as the ciphertext attribute-based encoding which is employed in cloud computing. The files that are being shared on the cloud have the structure hierarchy feature. During this project, we propose the encoding policy supported peculiarity for associate ordered file hierarchy in cloud computing. The files that are present in an exceedingly graded format are encoded in an integrated access structure. The files that are in a serial layer format are combined into one structure that is accessible. This method saves plenty of time and price for the encoding. Below the quality assumption, this projected policy is verified to be secure and safe. Within the encoding and decipherment processes, the expected theme is established to be extremely economical. With the number of files increasing within the cloud because the users keep uploading them, the benefits of the projected theme become additional evident.


Citation
Ms.Faiqa Mateen,Mr. Mohammed Khaleel Ahmed and Dr. G.S.S Rao (2017). An Encryption Scheme Based on Peculiarity For an Ordered File Hierarchy in Cloud Computing. International Journal of Computer Engineering In Research Trends, 4(10), 383-387. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I1002.pdf


Keywords : Cloud computing, data sharing, file hierarchy, cipher text-policy, attribute-based.

References
[1] C.-K. Chu, W.-T.Zhu, J. Han, J.-K. Liu, J. Xu, and J. Zhou, “Security concerns in popular cloud storage services,” IEEE Pervasive Comput., vol. 12, no. 4, pp. 50–57, Oct./Dec. 2013.
[2] T. Jiang, X. Chen, J. Li, D. S. Wong, J. Ma, and J. Liu, “TIMER: Secure and reliable cloud storage against data re-outsourcing,” in Proc. 10th Int. Conf. Inf. Secure. Pract.Exper., vol. 8434. May 2014, pp. 346–358.
[3] K. Liang, J. K. Liu, D. S. Wong, and W. Susilo, “An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing,” in Proc. 19th Eur. Symp. Res. Comput. Secur., vol. 8712. Sep. 2014, pp. 257–272. 
[4] T. H. Yuen, Y. Zhang, S. M. Yiu, and J. K. Liu, “Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks,” in Proc. 19th Eur. Symp. Res. Comput. Secur., vol. 8712. Sep. 2014, pp. 130–147.
[5] K. Liang et al., “A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 10, pp. 1667–1680, Oct. 2014.
[6] T. H. Yuen, J. K. Liu, M. H. Au, X. Huang, W. Susilo, and J. Zhou, “k-times attribute-based anonymous access control for cloud computing,” IEEE Trans. Comput., vol. 64, no. 9, pp. 2595–2608, Sep. 2015.
[7] J. K. Liu, M. H. Au, X. Huang, R. Lu, and J. Li, “Fine-grained two factor access control for Web-based cloud computing services,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 3, pp. 484–497, Mar. 2016.
[8] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer, May 2005, pp. 457–473. [9] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. 13th ACM Conf. Comput. Commun.Secur., Oct. 2006, pp. 89–98.
[10] W. Zhu, J. Yu, T. Wang, P. Zhang, and W. Xie, “Efficient attribute-based encryption from R-LWE,” Chin. J. Electron., vol. 23, no. 4, pp. 778–782, Oct. 2014.
[11] J. Bethencourt, A. Sahai, and B. Waters, “Cipher text-policy attribute based encryption,” in Proc. IEEE Symp.Secur. Privacy, May 2007, pp. 321–334.
[12] L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proc. 14th ACM Conf. Comput. Commun.Secur., Oct. 2007, pp. 456–465.
[13] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,” in Proc. 10th Int. Workshop Inf. Secur. Appl., Aug. 2009, pp. 309–323. 
[14] X. Xie, H. Ma, J. Li, and X. Chen, “An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing,” J. Universal Comput. Sci., vol. 19, no. 16, pp. 2349–2367, Oct. 2013. 
[15] F. Guo, Y. Mu, W. Susilo, D. S. Wong, and V. Varadharajan, “CP-ABE with constant-size keys for lightweight devices,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 763–771, May 2014.
[16] A. Balu and K. Kuppusamy, “An expressive and provably secure ciphertext-policy attribute-based encryption,” Inf. Sci., vol. 276, pp. 354–362, Aug. 2014.
[17] X. Liu, J. Ma, J. Xiong, and G. Liu, “Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data,” Int. J. Netw.Secur., vol. 16, no. 6, pp. 437–443, Nov. 2014.
[18] Y. Chen, Z. L. Jiang, S. M. Yiu, J. K. Liu, M. H. Au, and X. Wang, “Fully secure ciphertext-policy attribute based encryption with security mediator,” in Proc. 16th Int. Conf. Inf. Commun. Secur., vol. 8958. Dec. 2014, pp. 274–289.
[19] Y. Yang, J. K. Liu, K. Liang, K.-K. R. Choo, and J. Zhou, “Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data,” in Proc. 20th Eur. Symp. Res. Comput. Secur.(ESORICS), vol. 9327. Sep. 2015, pp. 146–166.
[20] J. Liu, X. Huang, and J. K. Liu, “Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption,” Future Generat. Comput. Syst., vol. 52, pp. 67–76, Nov. 2015.
[21] K. Liang et al., “A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing,” Future Generat. Comput. Syst., vol. 52, pp. 95–108, Nov. 2015.
[22] C.-I. Fan, V. S.-M.Huang, and H.-M. Ruan, “Arbitrary-state attributebased encryption with dynamic membership,” IEEE Trans. Comput., vol. 63, no. 8, pp. 1951–1961, Aug. 2014.
[23] H. Zheng, Q. Yuan, and J. Chen, “A framework for protecting personal information and privacy,” Secur.Commun.Netw., vol. 8, no. 16, pp. 2867–2874, Nov. 2015. 
[24] F. Xhafa, J. Wang, X. Chen, J. K. Liu, J. Li, and P. Krause, “An efficient PHR service system supporting fuzzy keyword search and fine-grained access control,” Soft Comput., vol. 18, no. 9, pp. 1795–1802, Sep. 2014.
[25] S. Wang, J. Yu, P. Zhang, and P. Wang, “A novel file hierarchy access control scheme using attribute-based encryption,” Appl. Mech. Mater., vols. 701–702, pp. 911–918, Jan. 2015.
[26] A.Shekinah Prema Sunaina,” Study on Competent and Revocable Data Access Control Scheme for Multi-Authority Cloud Storage Systems.” International Journal of Computer Engineering in Research Trends., vol.2, no.5, pp. 365-368, 2015.
[27] R.Srinivas and Ajay Kumar,” Attribute-Based Encryption for Reliable and Secure Sharing of PHR in Cloud Computing.” International Journal of Computer Engineering in Research Trends., vol.2, no.10, pp. 679-682, 2015.
[28] NUTAKKI PRASAD and K.KIRAN KUMAR,” A Dynamic Secure Multi Owner Data Sharing Scheme Over Cloud Computing.” International Journal of Computer Engineering in Research Trends., vol.2, no.10, pp. 889-895, 2015.
[29] S.L.SOWJANYA, D.RAVIKIRAN,” Secure Data Sharing for Dynamic Groups in the Public Cloud.” International Journal of Computer Engineering in Research Trends., vol.1, no.6, pp. 428-435, 2014.
[30] Allam Jyothi,G.Somasekhar and Dr S.Prem Kumar,” A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.” International Journal of Computer Engineering in Research Trends., vol.2, no.8, pp. 475-480, 2015.
 



DOI Link : Not yet assigned

Download :
  V4I1002.pdf


Refbacks : Currently There are no refbacks

Announcements


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events


Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.


Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.


IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert


IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)


Emerging Sources Citation Index (in process)


IJCERT title is under evaluation by Scopus.


Key Dates


☞   INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞   LAST DATE OF SUBMISSION : 31st March 2023
☞  SUBMISSION TO FIRST DECISION :
In 7 Days
☞  FINAL DECISION :
IN 3 WEEKS FROM THE DAY OF SUBMISSION

Important Announcements


All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index


Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)


Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links



Conference Proposal




DOI:10.22362/ijcert