Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/161114
Title: | Efficient Revocable and Auditable Access over Encrypted Cloud Data |
Researcher: | Kumar, naveen |
Guide(s): | Mathuria, Anish |
Keywords: | Data Privacy Cloud based e-health Algorithm Key Management Microsoft Azure |
University: | Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT) |
Completed Date: | 2017 |
Abstract: | Cloud data outsourcing services can potentially help reduce the IT budget of organizations.However, they pose significant risks to the security and privacy of the data as the data is outsourced to untrusted third-party servers. In this thesis, newlinewe propose security mechanisms for cloud data access control using symmetric key primitives. The contributions of this thesis are summarized below. We critically analyze the two types of key management hierarchy used for access control in outsourced data: user-based and resource-based. We show that both types of hierarchy have comparable public storage requirements. This result disproves a common belief that resource-based hierarchies require significantly more storage than user-based hierarchies. We also show that resource-based hierarchies are more efficient in terms of computation newlineand communication cost as compared to user-based hierarchies with respect to dynamic operations. The performance evaluation of dynamic operations is shown experimentally.We design a subscription-based hierarchical key assignment scheme with single key storage per user. Our construction is based on indirect key derivation with dependent keys. It reduces the public storage requirement of existing schemes, while also reducing the secret storage cost at the central authority. The scheme is formally analyzed using the provable security notion of key non-recovery. To our knowledge, this would be the first hierarchical key assignment scheme using dependent keys with a rigorous security proof.A weakness of existing write access control schemes is that a write authorized user can modify the files written by him even after the write privilege is revoked. We propose audit-based protocols so that if any unauthorized writes are performed they can be detected by the data owner. The protocols are implemented on Microsoft Azure platform and it is shown that the suggested mechanisms are viable in practice. newline |
Pagination: | xii, 150 p. |
URI: | http://hdl.handle.net/10603/161114 |
Appears in Departments: | Department of Information and Communication Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 82.36 kB | Adobe PDF | View/Open |
02_declaration and certificate.pdf | 80.15 kB | Adobe PDF | View/Open | |
03_acknowledgements.pdf | 58.26 kB | Adobe PDF | View/Open | |
04_contents.pdf | 118.71 kB | Adobe PDF | View/Open | |
05_abstract.pdf | 72.95 kB | Adobe PDF | View/Open | |
06_list of tables.pdf | 128.16 kB | Adobe PDF | View/Open | |
07_chapter 1.pdf | 283.56 kB | Adobe PDF | View/Open | |
08_chapter 2.pdf | 728.06 kB | Adobe PDF | View/Open | |
09_chapter3.pdf | 488.65 kB | Adobe PDF | View/Open | |
10_chapter 4.pdf | 274.42 kB | Adobe PDF | View/Open | |
11_chapter 5.pdf | 329.78 kB | Adobe PDF | View/Open | |
12_chapter 6.pdf | 85.3 kB | Adobe PDF | View/Open | |
13_reference.pdf | 101.98 kB | Adobe PDF | View/Open | |
14_chapter a.pdf | 121.07 kB | Adobe PDF | View/Open | |
15_chapter b.pdf | 203.31 kB | Adobe PDF | View/Open | |
16_chapter c.pdf | 120.14 kB | Adobe PDF | View/Open | |
17_list of publication.pdf | 71.13 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).
Altmetric Badge: