International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3480
Secure Data Access Control with Cipher Text and It’s Outsourcing in
Fog Computing
Kirti Madhavi
1
, Neha Bhutkar
2
, Pratiksha Kadu
3
, Babita Bhagat
4
1,2,3
Student, Computer of Engineering, PHCET College, Maharashtra ,India
4
Faculty, Computer of Engineering, PHCET College, Maharashtra, India
-------------------------------------------------------------------------------***--------------------------------------------------------------------------------
Abstract - In spite of the abundant advantages of storing
data on cloud, Security still remains a major hurdle which
needs to be conquered. The subsisting methods of protecting
data on cloud have failed in preventing data theft attacks. An
altered approach is carried out in our proposed system for
securing the data, which is fog computing, in addition to the
previous standard encryption mechanisms. The users using the
Cloud are monitored and their access patterns are recorded.
Every person who is trying to access the data is made to
answer the security questions. Also an OTP is provided to avoid
shoulder sniffing of password.
Fog computing is nothing but cloud computing to the
extreme of the network security. It provides computation and
storage services via CSP (Cloud Service Provider) to end
devices in Internet of Things (IoT). Attribute-Based Encryption
(ABE) is a public key encryption scheme that allows users to
encrypt and decrypt messages based on user attributes, which
guarantees data confidentiality and powerful data access
control. However, its computational cost for encryption and
decryption phase is directly proportional to the complexity of
the policies used.
Key Words: Access Control, Attribute Based Encryption,
Attribute Based Signature, Cipher text-Policy Attribute
Based Encryption, Cloud Service Provider, Data Security,
Internet of Things, Fog Computing.
1. INTRODUCTION
Today, cloud computing is considered a promising
prototype of computing, since it can provide users with
elastic computing resources based on shared computing
techniques, virtualization, etc. However, the universality of
Internet of Things (IoT) applications is changing the main
factor of computing. Centralized computer systems suffer
from unacceptable transmission latency and reduced system
performance due to the extremely large volume traffic
between IoT nodes and the cloud. Cloud computing is an
encouraging technology that exploits the prototypes of cloud
computing and IoT.
Although the "fog computing" prototype generates many
benefits, security issues, including data privacy and access
control, are the same as cloud computing and information
technology. In addition, they are easier to compromise and
unreliable, since fog nodes are distributed at the edge of the
network and cost much less than servers in the cloud.
Another way to solve these problems is to encrypt user data
before uploading. Attribute-based encryption (ABE) is a one-
to-many cryptographic technique that meets these
requirements. It has tools and techniques that provide access
control to the encrypted data through various access policies
and attributes referring to private keys and cryptographic
texts. In particular, the ABE encryption text policy (CP-ABE)
allows the data owner to define the access policy on a
universe of attributes that the user must possess to decrypt
the encrypted text and apply it to the data. This ensures the
confidentiality and control of high-precision data access.
However, existing solutions based on ABE are mainly aimed
at managing secure access to data for users, few studies
believe that there is no other requirement that the owner of
the data you want to authenticate some users to update data
encrypted. For example, Alice has outsourced cryptographic
data and data to the cloud, and expects only her many
friends who are authorized users can renew the
cryptography of the initial text. Therefore, the key update is
the secure encryption text that the user renews the cipher
text must be able to convince the cloud service provider
(CSP), which is a valid user. The traditional approach is to
sign changed data, which means that CSP should maintain at
the same time a list of valid public key users to verify users'
identities. However, it would be a big burden to keep the list
of keys, if the current number of users and CSP can know the
identity of users in this way, revealing the user's privacy. A
recent cryptographic technique known as based on study
attributes (ABS) can help the CSP to verify if the user is valid.
In an ABS system, the user can sign messages with a political
request and its attributes. Then, with the signature, the CSP
can verify the signer attributes satisfy the affirmation policy
without even knowing the signer's identity.
Therefore, the adoption of ABE and ABS can guarantee
data privacy, detailed access control and user verification,
but at the same time also implies a high computational cost
in cloud computing. The encryption, decryption and
signature operations of ABE and ABS require a large number
of module exponents, which normally grow linearly with the
number of attributes in the policies. This is a significant
challenge for users who access and modify data on IoT
devices with limited resources with limited computing and
archiving capabilities.
In this paper, we propose a secure control scheme for
accessing data in cloud computing for IoT. The main
contributions are as follows: