Sign In to Follow Application
View All Documents & Correspondence

System/Method To Revocation And Accountability Of Data Access Control In Cloud Storage

Abstract: Cipher text Policy Attribute Based Encryption (CP-ABE) is a promising technique which may lead to misuse of access credential. Cloud storage maintains CP-ABE system a framework for traceability and auditing for enhance security. The cloud security vulnerabilities, and cloud storage utilization framework is designed in order to protect the confidentiality of outsourced data, CP-ABE cloud storage system is proposed for traceability and auditing. We can trace and identify users who disclose the authentic data with CP-ABE. Cipher text-Policy Attribute Based Encryption (CP-ABE) guarantees security service in the cloud storage by maintaining the access credentials from misusage. In this paper, two main reasons are considered to access authentic information improperly: by the semi trusted authority and cloud user. To overcome, the proposed system preserve the authenticity and withdraw the keys a CP-ABE based cloud storage system uses white box traceability and auditing referred to as Cloud storage system preserving the security of data. 4 claims & 1 Figure

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
30 April 2022
Publication Number
19/2022
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

MLR Institute of Technology
Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad

Inventors

1. Mrs. G. Anitha
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad
2. Dr. Allam Balaram
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad
3. Dr. Koppula Srinivas Rao
Department of Computer Science and Engineering, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad
4. Dr. Nagireddy Venkata Rajasekhar Reddy
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad
5. Mrs. B. Varija
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad
6. Mr. Sk. Khaja Shareef
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad
7. Mr. Nagaram Ramesh
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad
8. Mr. J. Pradeep Kumar
Department of Information Technology, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal-500043, Medchal-District, Hyderabad

Specification

Description: SYSTEM/METHOD TO REVOCATION AND ACCOUNTABILITY OF DATA ACCESS CONTROL IN CLOUD STORAGE
Field of Invention
Cloud storage system allows authorized users to access data and makes accountable users to use the cloud data. CP-ABE is a technique that may lead to misuse of access credentials. Cloud storage maintains CP-ABE system a framework for traceability and auditing for enhance security.
Background of the Invention
In Cloud storage system vulnerabilities play a key role, in order to resolve by encrypting externalized data and the isolating the clients. And also to provide a convenient way for accessing data for cloud users whose data is out of unauthorized. The data required is made available to only known users in the cloud. Cloud storage system has default case, where it can’t consider the case to access credential which is being misused. The disclosure of information stored in the cloud results in prominence of organizations and individuals. To prevent security breach from outsider attackers Attribute based encryption (CN10904004B) is useful to reduce access credential misuse. A CP-ABE cloud storage system is proposed for finding the users not privileged and maintain database of outsourced users. We can trace and identify with CP-ABE the users who disclose their access credentials. The steps followed in the process trap door for the idea to recover the user details as per the corresponding credentials. Steps can be categorized into two types 1) white box traceability and 2) black box traceability.
White box traceability keeps track of users (CN108632032B) who mislead the decryption privileged keys.
Black box traceability maintains users who are build the decryption key from the available key from by an accountable user. An Accountability of user is explicitly cancelled with white box traceability and auditing is collected for the accountable users, in order to maintain storage in cloud. So to revoke the users auditing information is maintained in the model. The model accountable authority and implicitly revocable CP-ABE is used to revoke malicious users implicitly (US20140229136A1).
Summary of the Invention
The main objective of our research, use a generic Cipher text Policy Attribute Based Encryption model where the model maintains looks into CP-ABE model works with security and accountability and to revoke of permissions by auditing process. A standard model for securing credentials is referred to as Accountability Authority and Explicitly Revocable and Accountable Authority and Implicitly Revocable, respectively. Based on these two systems, of Cloud storage system provides the features of traceability of unauthorized cloud users, accountability, auditing and revoke malicious users.
A formal framework model of the proposed system, used to solve the vulnerabilities for cloud storage system deployment and an auditing procedure is used for reducing misusage of data in cloud storage. If a revocable user tries to change his private key in the online mode, the process fails in this case. So, a reliable structure is used for the generating keys, updates the list of audit and also finds the unknown key or id used during the process.

Brief Description of Drawings
Figure 1: cloud storage system
Detailed Description of the Invention
The model is used for finding the traceability, auditing and revocable of malicious cloud users. An informal way is used by users of cloud to access credentials, so to a refined cloud storage systems uses encryption as a technology frame work to achieve white box traceability for misbehavior of users in cloud for data access without permission. The identity of user requests for accessing credentials is allowed with specific permissions using auditing and accountability revoking of users is regarded as a part of the credential. The process of combing the feature of encryption and decryption techniques, the malicious users can’t extract, and user cannot disclose and further update the details which are enciphered with the credential.
The framework allows using an algorithm for checking credentials of user from the well known credentials assigned prior for determining the users of cloud storage. The approach has an detailed table with details of dedicated users in contact with cloud is used to reduce the storage. In this model users and authority together use credentials for accessing cloud storage which is unknown to each other, so that control on data is achieved. The provision of two different keys in the cloud system can help in authority for illegal way of accessing the data. So a user or authority can access cloud only if he knows user credential and non legitimate users can be found with auditing. In the revocation process keys can be instantly changed as unauthorized users can’t access the secret key. So, a mechanism is achieved for revocability by traceability and revocation. The cloud service providers has responsibility to manage data and access permission for the authorized resources through virtualization which make authorized user to have an less opportunity to control data. The cloud storage system gain ability to encapsulate the access control with cryptographic principles for key distribution to maintain integrity and maintain redundant storage achievable by auditing process. The authority maintains a decryption key to find a dishonest user from the inputs calculated by trace identification and audit information. The algorithm rollouts the users, as it is tedious process to decrypt the key and a reliable user is indicated by Audit process.
Cloud storage system further can be extended to learn misbehavior of user for sharing credentials with unauthorized user with unusual activities towards access of data with the regular data usage is updated in list with corresponding details of user login, downloads from unknown security payload. The traceability of unauthorized user is found from these details of history and unauthorized invalidate his credentials for accessing the cloud data. Cloud storage system uses ATER-CP-ABE and ATIR-CP-ABE frameworks use single key pair by performing a function which for accessing a row based attributes. The extension to the single use of access permission pairs, a multi row attribute policy is used. The single use policy is enhanced to multiple users accessing cloud data, an efficient framework is designed for real world applications with a fixed size attributes and the control permissions multiple times to update the services accordingly with real world applications.
Fig.1 Cloud storage system, has different elements which are described as follows:
• Data owners (Dos): Stores encrypted data published in public cloud before it is revealed to others.
• Data users (DU): These are authorized users.
• Semi Trusted Authority (AT): Access credentials are issued by DUs.
• Auditor (AU): Audit, Trace and revocable outcomes are send to DOs and DUs by AU and behaves as a trusted entity.

4 Claims & 1 Figure , Claims: The scope of the invention is defined by the following claims:

Claim:
1. The Cloud storage system comprises :
a) Cloud storage system accountability, authority and revocable cloud storage system supported by white box traceability where unauthorized users are revocable by logged information and activities by using super key.
b) Cloud storage system allows tracing and revoking malicious cloud users (leaking credentials) by decentralizing trust among Audit unit. The approach is used with multiple Auditors to build trust, once the user information is redistributed by the semi-trusted authority and build a trust worthy cloud storage system
c) A fully traceable Cloud storage system is designed in order to know the leakage information by the users, administrators and anyone for achieving the performance.
2. The Cloud storage system which supports track of credentials and auditing is claimed in claim 1, by maintaining credential disclosure in CP-ABE based cloud system by designing a storage system for revoke of credentials to users, maintaining logged list and securing the data by encryption process.
3. The Cloud storage system which supports track of credentials and auditing is claimed in claim 1, Black box traceability with redistribution of user credentials in secure manner. Black box traceability, in cloud storage system uses redistribution of credentials so that cloud storage can be minimized.
4. The Cloud storage system which supports track of credentials and auditing is claimed in claim 1, as fully traceable Cloud storage system is designed in order to know the leakage information by the users, administrators and anyone for achieving the performance.

Documents

Application Documents

# Name Date
1 202241025433-REQUEST FOR EARLY PUBLICATION(FORM-9) [30-04-2022(online)].pdf 2022-04-30
2 202241025433-FORM-9 [30-04-2022(online)].pdf 2022-04-30
3 202241025433-FORM FOR SMALL ENTITY(FORM-28) [30-04-2022(online)].pdf 2022-04-30
4 202241025433-FORM 1 [30-04-2022(online)].pdf 2022-04-30
5 202241025433-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [30-04-2022(online)].pdf 2022-04-30
6 202241025433-EVIDENCE FOR REGISTRATION UNDER SSI [30-04-2022(online)].pdf 2022-04-30
7 202241025433-EDUCATIONAL INSTITUTION(S) [30-04-2022(online)].pdf 2022-04-30
8 202241025433-DRAWINGS [30-04-2022(online)].pdf 2022-04-30
9 202241025433-COMPLETE SPECIFICATION [30-04-2022(online)].pdf 2022-04-30