Loading

Secure Cloud Storage of Text and Image Files by Giving Access Control to Users
Madhura Mahajan1, S C Dharmadhikari2
1Madhura Mahajan, PG Student, Dept IT, PICT, Pune, India.
2Dr. S C Dharmadhikari, Associate Professor, Dept IT, PICT, Pune, India.

Manuscript received on November 12, 2019. | Revised Manuscript received on November 25, 2019. | Manuscript published on 30 November, 2019. | PP: 4618-4622 | Volume-8 Issue-4, November 2019. | Retrieval Number: C5172098319/2019©BEIESP | DOI: 10.35940/ijrte.C5172.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is extensively used but it’s not completely trustworthy. It can be in terms of protecting or securing the confidential data from malicious attacks as well as from cloud providers. Also once the data is deployed on cloud, the user has no control over it. So rather than deploying the original text file the user encrypts the file and then uploads on the cloud. When this file needs to be shared with other it can be done using Cipher text Policy Attribute Based Encryption (CP-ABE). This gives the central access to the owner and secures the data from external attacks. Besides, the cloud provider serves both as the payee of resource consumption fee, lacking the transparency to data owners. So to reduce these factors a specific encryption strategy is been used and the time for encryption is also taken into account. The files are also encrypted by the priority that are given by the user during the file uploading section. A text file of size 1GB with the CP-ABE encryption strategy requires 174 seconds whereas encryption done using AES is 473 seconds and that of RSA is 330 seconds. Hence, this dissertation work proposes methodology to secure or protect encrypted cloud storage from Economic Denial of Sustainability attacks and give an efficient time constraint approach.
Keywords: Cipher text Policy Attribute Based Encryption, Access control.
Scope of the Article: Wireless Access Technologies for IoT.