Please use this identifier to cite or link to this item:
Title: Efficient Revocable and Auditable Access over Encrypted Cloud Data
Researcher: Kumar, naveen
Guide(s): Mathuria, Anish
Keywords: Data Privacy
Cloud based e-health
Key Management
Microsoft Azure
University: Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT)
Completed Date: 2017
Abstract: Cloud data outsourcing services can potentially help reduce the IT budget of organizations.However, they pose significant risks to the security and privacy of the data as the data is outsourced to untrusted third-party servers. In this thesis, newlinewe propose security mechanisms for cloud data access control using symmetric key primitives. The contributions of this thesis are summarized below. We critically analyze the two types of key management hierarchy used for access control in outsourced data: user-based and resource-based. We show that both types of hierarchy have comparable public storage requirements. This result disproves a common belief that resource-based hierarchies require significantly more storage than user-based hierarchies. We also show that resource-based hierarchies are more efficient in terms of computation newlineand communication cost as compared to user-based hierarchies with respect to dynamic operations. The performance evaluation of dynamic operations is shown experimentally.We design a subscription-based hierarchical key assignment scheme with single key storage per user. Our construction is based on indirect key derivation with dependent keys. It reduces the public storage requirement of existing schemes, while also reducing the secret storage cost at the central authority. The scheme is formally analyzed using the provable security notion of key non-recovery. To our knowledge, this would be the first hierarchical key assignment scheme using dependent keys with a rigorous security proof.A weakness of existing write access control schemes is that a write authorized user can modify the files written by him even after the write privilege is revoked. We propose audit-based protocols so that if any unauthorized writes are performed they can be detected by the data owner. The protocols are implemented on Microsoft Azure platform and it is shown that the suggested mechanisms are viable in practice. newline
Pagination: xii, 150 p.
Appears in Departments:Department of Information and Communication Technology

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File82.36 kBAdobe PDFView/Open
02_declaration and certificate.pdf80.15 kBAdobe PDFView/Open
03_acknowledgements.pdf58.26 kBAdobe PDFView/Open
04_contents.pdf118.71 kBAdobe PDFView/Open
05_abstract.pdf72.95 kBAdobe PDFView/Open
06_list of tables.pdf128.16 kBAdobe PDFView/Open
07_chapter 1.pdf283.56 kBAdobe PDFView/Open
08_chapter 2.pdf728.06 kBAdobe PDFView/Open
09_chapter3.pdf488.65 kBAdobe PDFView/Open
10_chapter 4.pdf274.42 kBAdobe PDFView/Open
11_chapter 5.pdf329.78 kBAdobe PDFView/Open
12_chapter 6.pdf85.3 kBAdobe PDFView/Open
13_reference.pdf101.98 kBAdobe PDFView/Open
14_chapter a.pdf121.07 kBAdobe PDFView/Open
15_chapter b.pdf203.31 kBAdobe PDFView/Open
16_chapter c.pdf120.14 kBAdobe PDFView/Open
17_list of publication.pdf71.13 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.