|
ENSURING SCALABLE, SECURED, MAINTENANCE AND ACCESS CONTROL OF COLLEGE DATA, USING CLOUD COMPUTINGKeywords: Cloud Computing , Encryption , Attribute-based encryption (ABE) , Proxy re-encryption , Lazy re-encryption. Abstract: Cloud computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. With the rapid development of information and communication technique, there is a growing interest in harnessing the inexpensive educational data in colleges. It is changing the way; colleges manage their data, due to its robustness, low cost and ubiquitous nature. By data outsourcing, colleges can be relieved from the burden of local data storage and maintenance. However, the fact those colleges no longer have physical possession of the possible large size of outsourced data integrity protection in cloud computing a very challenging and potentially formidable task especially for users with constrained computing resources and capabilities. Privacy security is a key issue of cloud storage. Encryption is a well-established technology for protecting sensitive data. This paper addresses how to ensuring scalable, secured, maintenance and access control of college data storage in Cloud Computing. The problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control still remains unresolved. To overcome this problem, we defining and enforcing policies based on data attributes and allowing data owner to delegate most of the computation tasks involved in fine-grained data access control to untrusted cloud servers without disclosing the underlying data contents. We achieve this goal by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption and lazy re-encryption.
|