International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3480 Secure Data Access Control with Cipher Text and It’s Outsourcing in Fog Computing Kirti Madhavi 1 , Neha Bhutkar 2 , Pratiksha Kadu 3 , Babita Bhagat 4 1,2,3 Student, Computer of Engineering, PHCET College, Maharashtra ,India 4 Faculty, Computer of Engineering, PHCET College, Maharashtra, India -------------------------------------------------------------------------------***-------------------------------------------------------------------------------- Abstract - In spite of the abundant advantages of storing data on cloud, Security still remains a major hurdle which needs to be conquered. The subsisting methods of protecting data on cloud have failed in preventing data theft attacks. An altered approach is carried out in our proposed system for securing the data, which is fog computing, in addition to the previous standard encryption mechanisms. The users using the Cloud are monitored and their access patterns are recorded. Every person who is trying to access the data is made to answer the security questions. Also an OTP is provided to avoid shoulder sniffing of password. Fog computing is nothing but cloud computing to the extreme of the network security. It provides computation and storage services via CSP (Cloud Service Provider) to end devices in Internet of Things (IoT). Attribute-Based Encryption (ABE) is a public key encryption scheme that allows users to encrypt and decrypt messages based on user attributes, which guarantees data confidentiality and powerful data access control. However, its computational cost for encryption and decryption phase is directly proportional to the complexity of the policies used. Key Words: Access Control, Attribute Based Encryption, Attribute Based Signature, Cipher text-Policy Attribute Based Encryption, Cloud Service Provider, Data Security, Internet of Things, Fog Computing. 1. INTRODUCTION Today, cloud computing is considered a promising prototype of computing, since it can provide users with elastic computing resources based on shared computing techniques, virtualization, etc. However, the universality of Internet of Things (IoT) applications is changing the main factor of computing. Centralized computer systems suffer from unacceptable transmission latency and reduced system performance due to the extremely large volume traffic between IoT nodes and the cloud. Cloud computing is an encouraging technology that exploits the prototypes of cloud computing and IoT. Although the "fog computing" prototype generates many benefits, security issues, including data privacy and access control, are the same as cloud computing and information technology. In addition, they are easier to compromise and unreliable, since fog nodes are distributed at the edge of the network and cost much less than servers in the cloud. Another way to solve these problems is to encrypt user data before uploading. Attribute-based encryption (ABE) is a one- to-many cryptographic technique that meets these requirements. It has tools and techniques that provide access control to the encrypted data through various access policies and attributes referring to private keys and cryptographic texts. In particular, the ABE encryption text policy (CP-ABE) allows the data owner to define the access policy on a universe of attributes that the user must possess to decrypt the encrypted text and apply it to the data. This ensures the confidentiality and control of high-precision data access. However, existing solutions based on ABE are mainly aimed at managing secure access to data for users, few studies believe that there is no other requirement that the owner of the data you want to authenticate some users to update data encrypted. For example, Alice has outsourced cryptographic data and data to the cloud, and expects only her many friends who are authorized users can renew the cryptography of the initial text. Therefore, the key update is the secure encryption text that the user renews the cipher text must be able to convince the cloud service provider (CSP), which is a valid user. The traditional approach is to sign changed data, which means that CSP should maintain at the same time a list of valid public key users to verify users' identities. However, it would be a big burden to keep the list of keys, if the current number of users and CSP can know the identity of users in this way, revealing the user's privacy. A recent cryptographic technique known as based on study attributes (ABS) can help the CSP to verify if the user is valid. In an ABS system, the user can sign messages with a political request and its attributes. Then, with the signature, the CSP can verify the signer attributes satisfy the affirmation policy without even knowing the signer's identity. Therefore, the adoption of ABE and ABS can guarantee data privacy, detailed access control and user verification, but at the same time also implies a high computational cost in cloud computing. The encryption, decryption and signature operations of ABE and ABS require a large number of module exponents, which normally grow linearly with the number of attributes in the policies. This is a significant challenge for users who access and modify data on IoT devices with limited resources with limited computing and archiving capabilities. In this paper, we propose a secure control scheme for accessing data in cloud computing for IoT. The main contributions are as follows: