Internati
o
nal
Journal of Ele
c
trical
and Computer
Engineering
(IJE
CE)
V
o
l.
6, N
o
. 5
,
O
c
tob
e
r
201
6, p
p
. 2
338
~234
4
I
S
SN
: 208
8-8
7
0
8
,
D
O
I
:
10.115
91
/ij
ece.v6
i
5.1
082
0
2
338
Jo
urn
a
l
h
o
me
pa
ge
: h
ttp
://iaesjo
u
r
na
l.com/
o
n
lin
e/ind
e
x.ph
p
/
IJECE
A Secured Cloud Data Storage
with Access Privileges
Nare
sh
Vuru
k
o
nd
a,
B
.
T
h
i
r
u
m
al
a
R
a
o,
B.T
i
r
a
p
a
t
h
i
R
e
dd
y
Department o
f
C
o
mputer Scien
c
e &
Engineering
,
KL University
, I
ndia
Article Info
A
B
STRAC
T
Article histo
r
y:
Received Apr 13, 2016
Rev
i
sed
Ju
l 18
,
20
16
Accepte
d Aug 7, 2016
In proposed framework client s
ource in
formatio
n reinforcem
ents off-site to
outsider distribu
ted storage ben
e
fits to
decre
a
se inform
ation ad
m
i
nistration
c
o
sts.
In a
n
y
ca
se
,
c
l
ie
nt
must
ge
t protection
ensure for
th
e outsourced
inform
ation,
which is
current
l
y
safeguard
ed b
y
ou
tsiders.
To
ac
com
p
lish
such security
objectives, FADE
is based upon an arran
g
ement of
cr
y
p
tograph
i
c k
e
y
op
erat
ions
that are s
e
lf-k
ep
t up b
y
a m
a
jorit
y
of
k
e
y
supervisors that
are fr
ee of outsid
e
r mi
sts. In unmistakabl
e, FADE
goes about
as
an ov
erl
a
y fra
m
e
work that wo
rks
flawles
s
l
y o
n
toda
y's
d
i
s
t
rib
u
ted s
t
or
ag
e
adm
i
nis
t
rati
ons
. Actual
ize
a pro
o
f-o
f-idea model of FADE on
Amazon S3,
one of
today
'
s distributed
storage admi
nistrations. M
y
work
overs
ee, esteem
includ
ed s
ecurit
y
highl
ights
ac
clim
at
ize wer
e
today
'
s distr
i
buted storag
e
administration.
o
u
r res
earch work
proceeds
in
ens
u
ring the f
ile
ac
c
e
s
s
control
and assured
deletion in
multi clo
ud envi
ronment
and redu
cing
the meta d
a
ta
m
a
nagem
e
nt,
th
ere b
y
the
cloud
s
t
orage b
ecom
e
m
o
re attr
ac
tive
and m
a
n
y
users will
adopt
the
cloud
space i
n
order
to d
i
m
i
ni
sh the d
a
t
a
stor
age cost
.
Keyword:
Assu
red
d
e
letio
n
C
l
ou
d st
o
r
a
g
e
Fi
ne grai
ned
Pol
i
c
y
base
d a
ccess co
nt
r
o
l
Security
Copyright ©
201
6 Institut
e
o
f
Ad
vanced
Engin
eer
ing and S
c
i
e
nce.
All rights re
se
rve
d
.
Co
rresp
ond
i
ng
Autho
r
:
Nares
h
V
u
r
u
ko
nda
,
Depa
rt
m
e
nt
of
C
o
m
put
er
Sci
e
nce a
n
d
En
g
i
neeri
n
g,
KLUn
i
v
ersity,
Vad
d
es
waram
,
G
unt
ur
,
52
2
5
0
2
,
A
.P
, I
n
di
a.
Em
a
il: n
a
resh
.v
uru
kon
d
a
@gmail.co
m
1.
INTRODUCTION
C
l
ou
d st
o
r
a
g
e
i
s
a s
h
ow
u
p
adm
i
ni
st
rat
i
on
dem
onst
r
at
e
s
t
h
at
em
pow
e
r
s el
em
ent
an
d
vent
ure
s
t
o
outs
o
urce the
ware
house
of i
n
form
ation reinforcem
ents
to rem
o
te cloud
worker re
quiring little to no effort
.
Be that as
it may, cloud c
u
stom
ers
m
u
st authorize
s
ecurity co
nfirm
a
ti
o
n
o
f
th
eir outso
urced informatio
n
rein
forcem
en
ts th
e exp
a
nd
ing
p
r
aise of
d
i
strib
u
t
ed
st
o
r
ag
e is
prev
ailing
asso
ciation
s
to
an
alyze mo
v
i
n
g
inf
o
rm
ation o
u
t
of t
h
eir
o
w
n
serve
r
farm
s and
into
the cl
ou
d. I
t
is t
h
e lon
g
-h
eld
l
o
ng for re
gistering as
an
adequacy [1], can possi
bl
y
chan
ge
ove
r
an ex
pa
nsi
v
e
part
o
f
t
h
e
I
T
com
p
any
,
m
a
ki
ng
pr
o
g
r
a
m
m
i
ng
co
nsid
erab
ly ad
d
ition
a
lly b
e
gu
ilin
g
as an
admin
i
stratio
n
and
b
u
ild, th
e way IT eq
u
i
p
m
en
t is p
l
ann
e
d
and
g
e
t.
Di
st
ri
b
u
t
e
d c
o
m
put
i
ng al
l
ude
s t
o
b
o
t
h
t
h
e a
p
pl
i
cat
i
ons
pass
ed o
n
as a
d
m
i
ni
st
rat
i
ons
ove
r
t
h
e I
n
t
e
r
n
et
and t
h
e e
qui
p
m
ent
and pl
a
n
pr
o
g
ram
m
i
n
g i
n
t
h
e dat
a
cent
e
rs t
h
at
o
r
ga
ni
ze t
hose
adm
i
ni
st
rat
i
ons. A
meth
o
d
o
l
og
y fram
ew
o
r
k th
at
add
r
esses th
e
issu
es
o
f
convo
lu
ted strateg
i
es is ch
aracteri
zed
an
d em
b
e
llish
e
d
b
a
sed
on
th
e n
ecessities of th
ose app
r
oach
es, cryp
t
ograph
i
c enh
a
n
c
e
m
en
ts th
at immeasu
r
ab
ly p
r
op
el
au
tho
r
ization
cap
acity o
f
Time-b
ased
reco
rds, wh
en
m
a
de,
are e
x
p
r
esse
d t
o
have
an
en
d t
i
m
e
[2]
.
AB
E
vi
ew
poi
n
t
based
enc
r
y
p
t
i
on i
s
t
o
b
u
i
l
d
up
t
h
e ca
paci
t
y
t
o
dec
r
ease c
r
y
p
t
o
g
r
a
phi
c e
x
pen
s
es.
At
th
e po
in
t
wh
en
th
e cloud
is
mad
e
op
en
in
p
a
y as y
o
u go ang
l
e to th
e
well kn
own
op
en we call it as op
en
cl
ou
d. Sel
f
-sat
i
s
fi
ed M
u
g a ph
ot
o
g
ra
p
h
di
ssem
i
nat
i
on Web
s
i
t
e
faci
l
i
t
a
t
e
d t
e
raby
t
e
s of p
h
o
t
o
gra
p
hs
o
n
Am
azon S3 in 2006 a
n
d spa
r
ed a
gr
eat m
a
ny dollars on proceed wit
h
ca
pacity ga
dgets u
tilizing distri
bute
d
stora
g
e fo
r fa
r of
f
rei
n
f
o
rc
em
ent
co
uld disco
v
er
in
the syste
m
[3]. Drop
box-like m
achine to m
ove
sou
n
d
/
v
i
d
eo re
cor
d
s f
r
om
t
h
ei
r adva
nce
d
m
obi
l
e
p
h
o
n
es t
o
t
h
e u
nha
p
p
i
n
ess, gi
ve
n t
h
at
PD
As re
gul
arl
y
have
characte
r
ized
capacity assets. Aside
from
orga
nizati
on a
n
d
G
o
ver
n
m
e
nt
C
o
m
p
any
,
pe
opl
e,
t
h
i
r
d
gat
h
eri
n
g
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
A Sec
u
re
d C
l
o
u
d
D
a
t
a
St
or
a
g
e w
i
t
h
Ac
cess
Pri
v
i
l
e
ges (
N
a
r
esh
Vur
u
k
o
n
d
a
)
2
339
worker secu
rit
y
m
a
k
e
su
bstan
ce to
t
h
e allotted
b
y
th
e s
u
bst
a
nce
w
o
r
k
e
r
an
d a
u
t
h
ori
z
at
i
on o
f
e
n
d
o
r
sem
e
n
t
approaches
and client c
o
nsents.
We started
FADE. Th
e first is selectiv
e co
ntro
l k
e
y u
tilized
b
y
k
e
y con
t
ro
ller and
th
e seco
nd
on
e is
in
fo
rm
atio
n
power k
e
y
u
tilized
b
y
Clou
d Clien
t
[4
]. FA
DE su
m
s
u
p
ti
m
e
-b
ased
record en
sured
can
cellatio
n
into an all the
m
o
re fine
-graine
d
access
called stra
tegy based
docum
e
nt settle
d cancelation, in
whic
h
doc
um
ents are joi
n
with m
o
re
pliant doc
u
m
e
nt acce
ss approach
(e.g., tim
e
ter
m
ination, read/c
ompos
e
consents
of certify clients) and are
totally erased when
the
consolidate re
cord access strategies are annul and
get
to
be out of date
[5]. proceed
s in ens
u
ring the file access control
and as
sured
deletion in m
u
lti cloud
envi
ro
nm
ent
and
re
d
u
ci
n
g
t
h
e m
e
t
a
dat
a
m
a
nagem
e
nt
, t
h
e
r
e by
t
h
e cl
ou
d
st
ora
g
e
bec
o
m
e
m
o
re at
t
r
act
i
v
e a
n
d
many users
will adopt the
clou
d space in order to dim
i
nish
the
data storage
cost
[6].
2.
R
ELA
TED
WORK ON
CLOU
D SEC
U
R
I
TY AND
AC
C
E
SS
C
O
NTR
O
L
The cl
o
ud c
o
m
put
i
n
g
does
n
o
t
gi
ve co
nt
r
o
l
o
v
er t
h
e
p
u
t
aw
ay
i
n
fo
rm
ati
o
n
i
n
cl
ou
d ser
v
e
r
farm
s. The
cl
ou
d a
d
m
i
ni
strat
i
on
su
p
p
l
i
e
r
s
ha
ve
bri
m
m
i
ng
wi
t
h
co
nt
r
o
l
o
v
er
t
h
e i
n
fo
rm
ati
on, t
h
e
y
can
pl
ay
ou
t
any
m
a
l
e
vol
ent
un
dert
a
k
i
n
gs,
f
o
r
exam
pl
e,
duplicate, decim
a
ting, altering,
and s
o
on. T
h
e cloud guara
n
tee
s
certain
lev
e
l
of con
t
ro
l ov
er t
h
e
v
i
rtu
a
l m
ach
in
es [7
].
Beca
use of
this
a
b
s
e
nce of
con
t
ro
l
ov
er th
e in
formatio
n
lead
s in
m
o
re
pro
m
in
en
t security issu
es th
an
th
e non
sp
eci
fi
c cl
ou
d c
o
m
p
u
t
i
ng m
odel
as a
ppea
r
e
d
i
n
Fi
g
u
re
1.
Di
st
ri
b
u
t
e
d st
ora
g
e i
s
an
ot
her
bu
si
ness
answ
er f
o
r re
m
oved rei
n
fo
r
c
em
ent
out
s
o
u
r
ci
n
g
, as i
t
o
ffe
rs a
reflectio
n o
f
o
u
trig
ht sto
r
age
ro
om
for c
u
sto
m
ers to h
o
st in
fo
rm
ation rei
n
f
o
rcem
ents
in
a p
a
y-
as y
o
u-g
o
w
a
y
[8].
Tim
e
based File
gua
ra
nteed
Deletion is the
Existing access
[9],[10]. Tim
e
-ba
s
ed docum
e
nt
settled
erasure, wh
ich is in
itially tr
a
n
sported
i
n
, i
m
p
l
ies th
at reco
rd
s can
b
e
safely erased
and
p
e
rsist
for al
l ti
m
e
rem
o
te after a pre
-
cha
r
acte
r
ized de
gree.
The princi
pl
e th
ou
gh
t is th
at a record
i
s
scram
b
led
with
an
i
n
f
o
rm
at
i
on ke
y
by
t
h
e p
r
o
p
ri
et
or
of t
h
e
d
o
c
u
m
e
nt
, and t
h
i
s
i
n
f
o
rm
at
i
on key
i
s
m
o
re rem
o
t
e
encode
d
wi
t
h
a
cont
rol
key
by
a
se
gre
g
at
ed key
m
a
nager [
11]
,
[
1
2
]
.
S
o
m
e
t
i
m
e
s
when
t
h
e dat
a
t
h
e
f
t
by
i
n
si
der
i
s
s
i
m
p
l
y
passe
d
wi
t
h
t
h
e hel
p
o
f
c
r
eat
i
o
n
o
f
dec
o
y
fi
l
e
o
n
dem
a
nd [
13]
.
Th
e
k
e
y con
t
roller is a serv
er th
at is essen
tial fo
r cryp
t
o
grap
h
i
c
k
e
y ad
m
i
n
i
stratio
n. Th
e co
n
t
ro
l
k
e
y
is ti
me-b
ased, co
n
t
en
t th
at it
will b
e
to
tally
cleared
b
y
th
e
k
e
y ad
m
i
n
i
strato
r wh
en
a d
i
sco
n
tinu
a
n
ce time i
s
co
m
e
to
, where th
e su
sp
en
si
on
tim
e is p
o
r
trayed
wh
en
th
e
reco
rd
is in
itially in
sisted
.
With
ou
t th
e
con
t
rol k
e
y,
the inform
atio
n
key a
n
d thus
the i
n
form
ation
record c
ontinue sc
ram
b
led a
n
d are
hope t
o
be
diffic
u
lt to
reach.
In
th
is m
a
n
n
e
r, th
e fund
am
en
tal secu
rity d
o
main
o
f
record g
u
a
ran
t
eed
exp
u
n
c
tion
is th
at reg
a
rd
less
o
f
th
e fact
th
at
a
clou
d worker do
es no
t
exp
e
l fin
i
sh
up
d
o
c
u
m
en
t
du
p
licates
from
its
sto
c
k
p
ilin
g,
tho
s
e do
cu
m
e
n
t
s
persi
s
t
e
n
co
de
d an
d
u
n
rec
o
ve
rabl
e.
Lat
e
r, t
h
e t
h
o
u
ght
of t
i
m
e
-based
d
o
c
u
m
e
nt
bey
o
nd a
n
y
d
o
u
b
t
ca
nce
l
l
a
t
i
o
n
i
s
pr
ot
ot
y
p
e
d
i
n
Vani
s
h
.
Va
ni
sh c
u
t
a
n
i
n
fo
r
m
at
i
on key
i
n
t
o
di
ffe
re
nt
key
sha
r
es,
w
h
i
c
h
are t
h
e
n
acc
um
ul
at
ed
i
n
va
ri
o
u
s
hu
b
s
of
an
o
p
e
n
Peer-t
o-
Peer
Di
st
ri
b
u
t
e
d
Ha
sh Ta
bl
e (
P
2
P
DH
T)
fram
e
wo
rk
[
1
4]
. I
n
di
vi
d
u
al
i
n
f
o
rm
at
i
on p
u
t
away
i
n
t
h
e
C
l
ou
d m
a
y
cont
ai
n acc
ou
nt
num
bers,
pas
s
w
o
r
d
s
,
n
o
t
e
s,
and
ot
her c
r
i
t
i
cal
dat
a
th
at co
u
l
d
b
e
utilized
an
d
ab
used
b
y
a rap
s
callio
n
,
a co
n
t
end
e
r, o
r
an
o
f
ficial co
u
r
tro
o
m
. Th
is in
fo
rm
ati
o
n
are
reser
v
e
d
, d
u
p
l
i
cat
ed, an
d ch
r
oni
cl
ed
by
C
l
oud Se
r
v
i
ce Pr
o
v
i
d
e
r
s (C
SP
s),
reg
u
l
a
rl
y
wi
t
h
out
cl
i
e
nt
s'
appr
o
v
al
an
d con
t
ro
l.
Self-Ann
ih
ilating
inform
atio
n
for t
h
e m
o
st p
a
rt
go
es
for securing
th
e clien
t
in
fo
rm
atio
n
'
s
pr
ot
ect
i
o
n
.
Ev
ery
one o
f
t
h
e
i
n
fo
rm
ati
on and t
h
ei
r d
upl
i
c
at
es get
t
o
be dest
r
u
ct
ed o
r
i
ndi
sce
r
ni
bl
e af
t
e
r a
cl
i
e
nt
i
ndi
cat
e
d
t
i
m
e, wi
t
h
n
o
cl
i
e
nt
m
e
di
ati
on.
What
'
s
m
o
re
, t
h
e
dec
odi
ng
key
i
s
dest
r
u
ct
ed a
f
t
e
r t
h
e
cl
i
e
nt
d
e
term
in
ed
time. To
act
u
a
lize th
e SADS security
framework
we are u
tilizin
g
AES and
Ran
dom
k
e
y
Gen
e
ration
.
Arb
itrary Key era is t
h
e
way
to
ward pr
odu
cin
g
k
e
ys fo
r cryp
tog
r
aph
y
. A k
e
y
is u
tilized
t
o
enco
de a
n
d
un
scram
b
l
e
what
ever
i
n
f
o
rm
ation
i
s
bei
n
g sc
r
a
m
b
l
e
d/
dec
ode
d
[1
5]
.
3.
IMPLEME
N
TATION
We
nam
e
a distribute
d
storage
fram
e
work brought
sec
u
re
access
be
nefit ove
r
cloud
inform
ation
like
FADE ,
whic
h intends to
bear the c
o
st of m
e
thodol
ogy
control settled cancellation for rec
o
rd that are
avai
l
a
bl
e by
t
oday
'
s di
st
ri
b
u
t
ed st
ora
g
e ad
m
i
ni
st
rat
i
ons. We
colleague records
w
ith
do
cu
m
e
n
t
asso
ciatio
n
strateg
i
es th
at
co
n
t
ro
l
h
o
w
docu
m
en
ts can
be go
tten
too
,
we th
en
started
arran
g
e
m
e
n
t
b
a
sed
d
o
c
u
m
en
t settled
erasu
r
e, i
n
w
h
i
c
h case are
w
i
t
hout
a
do
u
b
t
cancel
an
d m
a
de u
n
r
eco
ve
r
a
bl
e by
any
o
n
e
whe
n
t
h
ei
r r
e
l
a
t
e
d
reco
rd
ap
p
r
oac
h
st
rat
e
gi
es are
ab
ol
i
s
h
[1
6]
-[
18]
.
W
e
p
o
rtrays th
e essen
tial op
eration
s
. On
cry
p
tog
r
aph
i
c k
e
y
s
in orde
r to
accom
p
lish approach
c
o
ntrol and settled erasure [19].
FADE like
w
ise infl
uenc
es real
cry
p
t
o
gra
p
hi
c
st
rat
e
gi
es,
n
u
m
beri
ng
pr
ope
rt
y
base
d e
n
cr
y
p
t
i
on
(
A
B
E
)
and
a m
a
jori
t
y
of
key
c
o
nt
r
o
l
l
e
r i
n
vi
ew o
f
ed
ge a
rra
nge
d s
h
ari
n
g.
W
e
e
x
ec
ut
e a
m
odel
of F
A
DE t
o
s
h
o
w
i
t
s
get
up a
nd
go
, and sy
st
em
at
ical
l
y
conce
n
t
r
at
e o
n
i
t
s
execut
i
o
n fl
y
i
ng whe
n
i
t
w
o
r
k
s wi
t
h
Am
azon
S
3
. Ou
r
e
xpl
orat
or
y
resul
t
s
gi
ve bi
t
s
o
f
kn
o
w
l
e
d
g
e i
n
t
o
t
h
e
e
x
ecut
i
o
n sec
u
ri
t
y
e
x
c
h
an
ge
o
f
f
w
h
en F
A
DE i
s
s
e
nt
by
an
d
by
. I
n
t
h
i
s
pape
r,
we
charact
e
r
i
ze t
h
e
m
e
t
a
dat
a
of
Fade
bei
n
g j
o
i
n
ed t
o
i
n
di
vi
d
u
al
i
n
f
o
rm
at
i
on rec
o
r
d
s
[2
0]
,
[
2
1
]
.
W
e
t
h
en
po
rt
ray
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
I
J
ECE
Vo
l. 6
,
N
o
. 5
,
O
c
tob
e
r
20
16
:
233
8
–
23
44
2
340
how
we
exec
ute the c
u
stom
er a
n
d a m
a
jority of
key
d
i
recto
r
s
and
ho
w th
e cu
st
o
m
er co
llab
o
rates
with
th
e
cl
ou
d.
1. Key
C
ont
r
o
l
l
er
2.
C
l
ou
d use
r
3. C
l
ou
d a
d
m
i
n se
rve
r
4.
Policy ba
sed access c
ont
rol
5. Pol
i
c
y
ba
sed
assu
re
d del
e
t
i
o
n
3.
1.
Key Controlle
r
Fade is base
d
on a m
a
jority of
key adm
i
nistrators
, each
of
whic
h is a stand-alone substance t
h
a
t
keeps up strate
gy base
d
keys for access c
ont
rol a
nd
guar
a
n
t
eed canc
e
llation. Sorts of key
s
: Data key, c
o
ntrol
key, access
ke
y, rem
o
te client. Num
e
rous arrangem
en
ts, approac
h
rec
h
arging.
Arra
ngem
e
nt cancellation will
be fi
ni
she
d
by
key
di
rect
or
.
3.
2.
Clou
d User
Th
e on
e is g
e
ttin
g
to
th
e ap
pro
ach
es set b
y
th
e clo
u
d
ch
ief. Clien
t
is
leg
iti
mate o
n
th
e o
ff ch
an
ce th
at
h
e
g
e
t t
o
ju
st
th
e arrang
emen
ts set b
y
the clo
u
d
ad
m
i
n
i
strator or el
se h
e
will b
e
d
i
stin
gu
ish
i
ng
as a
m
i
sreprese
nt
at
i
on cl
i
e
nt
i
n
t
h
e cl
oud
or
gani
zi
ng. I
n
t
h
e ev
ent
t
h
at
t
h
e cl
ient
'
s
arrangem
e
nt
s are su
bst
a
nt
i
a
l
wh
ich
d
o
l
ed
ou
t fo
r h
i
m
,
th
en
th
e clien
t
can g
e
t to ev
ery
on
e
o
f
th
e
b
e
n
e
fits in
th
e cl
o
ud org
a
n
i
zing
.
3.
2.
1.
Multiple po
licies
Arrangem
ents are only the entra
n
ce be
nefi
ts bei
ng set
b
y
t
h
e cl
ou
d di
rect
or
o
n
t
h
e
pr
o
p
ri
et
o
r
'
s
i
n
f
o
rm
at
i
on p
u
t
away
i
n
t
h
e
cl
ou
d ser
v
e
r
.
Act
i
v
e i
n
fo
rm
at
i
on
doc
um
ent
s
bei
n
g p
u
t
a
w
ay
by
t
h
e
p
r
op
ri
et
or
st
ay
on cl
ou
d
wi
t
h
rel
a
t
e
d ar
r
a
ngem
e
nt
of
cl
i
e
nt
char
act
er
ized rec
o
rd
acc
ess strategies
(e.g., tim
e ter
m
ination,
read/
c
om
pose aut
h
ori
zat
i
o
ns
of a
p
p
r
o
v
e
d
cl
i
e
nt
s), s
u
ch
that inform
ation records are
availab
l
e j
u
st to
clien
t
s
who
fulfill the
doc
u
m
e
nt access a
p
proac
h
es Use
r
kee
p
ing
in m
i
nd the
end
goal to ha
ve
entry
conse
n
t's a
nd
for e
r
asure
nee
d
'
s
sure
approa
ches
which a
r
e
being
set by t
h
e chief.
3.
3.
Cloud Admin Server
Th
e clou
d, k
e
pt u
p
b
y
an
ou
tsid
er supp
lier, giv
e
s
sto
r
ag
e roo
m
to
facilitat
i
n
g
inform
atio
n
reco
rd
s fo
r
t
h
e be
nefi
t
o
f
vari
ous
FA
DE
cust
om
ers i
n
a pay
-
as
-y
o
u
-
g
o way
.
Eac
h
o
f
t
h
e i
n
fo
rm
at
ion
D
o
cum
e
nt
s are
connected
with a
m
i
x of record acce
ss polici
e
s [3]. FADE is based on
the flim
sy cloud i
n
terface
, and accept
ju
st
t
h
e es
sent
i
a
l
cl
ou
d
ope
rat
i
ons
f
o
r
t
r
an
sfe
rri
n
g
a
n
d
do
w
n
l
o
adi
n
g i
n
f
o
rm
at
i
on
doc
um
ent
s
.
3.
3.
1.
Clou
d Manager
Typ
i
cally d
eals with
t
h
e
p
r
oprieto
r's in
formatio
n
/
do
cu
m
e
nts fro
m
th
e en
d clien
t
s. Part: Man
a
g
e
s th
e
en
tran
ce co
n
s
en
ts fo
r an end clien
t
wh
o is
lo
ok
ing
fo
r ac
cess to t
h
e
proprietor
d
o
c
u
m
en
ts pu
t away
in
th
e
clo
u
d
serv
er. Clo
u
d
ch
ief m
a
k
e
s and
i
n
clud
es an
end
clien
t
b
y
g
e
tting
en
rolled
,
wh
erein
he g
i
v
e
s th
e en
t
r
an
ce
authorizations to access to t
h
e prop
rietor's doc
um
ent put away in the
cloud server.
Additionally has the
ab
ility to
clo
s
e d
o
wn
th
e clien
t
s’ fram
ewo
r
k
wh
en
h
e
/sh
e
tries to
g
e
t to th
e d
o
cu
m
e
n
t
s th
at h
a
s no
sp
ecific
access aut
h
oriz
ation,
where
in they
will be
obstructed
a
s
tre
achery.
3.
3.
2.
Clou
d Ser
v
er
Clo
u
d
Serv
er
g
i
v
e
s inform
at
io
n
storag
e roo
m
to
th
e cli
e
n
t/in
fo
rm
atio
n
p
r
op
rietor to
sto
r
e th
e
inform
ation that gives the se
cure
d and e
ffe
ctive
m
e
t
hod
for
putting awa
y
the propri
etor'
s
inform
ation.
An
asset put awa
y
in cloud
server
has
set of access a
u
th
orizations whic
h are
bein
g set
by the i
n
formation
p
r
op
rietor wh
ile tran
sferri
ng
to
th
e serv
er b
y
m
ean
s o
f
cloud
. Pr
opr
ieto
r
reco
rd
s
p
u
t
away
in cloud serve
r
are
t
husl
y
k
e
pt
up
by
t
h
e T
P
A
(
o
ut
si
der
eval
uat
o
r
)
.
A
not
her c
r
i
t
i
cal
vi
ewpoi
n
t
here i
s
t
h
at
di
ffe
rent
m
i
st
s are use
d
t
o
kee
p
t
h
ei
r i
n
f
o
rm
at
i
on as
secure
. I
n
one
of t
h
e cl
o
ud
se
rve
r
fa
rm
t
h
e enco
de
d dat
a
p
u
t
away
a
nd a
not
her
clo
u
d
can
b
e
utilized
to
sto
r
e
th
e k
e
ys
of th
e cryp
tograph
y
calcu
latio
n
.
With
a sp
eci
fic en
d go
al to
scram
b
l
e
t
h
e dat
a
we
re
qui
re sol
i
d
c
r
y
p
t
o
gra
p
hy
cal
cul
a
t
i
on s
u
c
h
t
h
at
i
t
m
a
y
be
have
key
s
i
.
e.,
pu
bl
i
c
key
a
nd/
o
r
p
r
i
v
ate k
e
y
[
22].
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
A Sec
u
re
d C
l
o
u
d
D
a
t
a
St
or
a
g
e w
i
t
h
Ac
cess
Pri
v
i
l
e
ges (
N
a
r
esh
Vur
u
k
o
n
d
a
)
2
341
Fi
gu
re
1.
The
B
l
ock
Di
ag
ram
o
f
cl
o
u
d
st
o
r
a
g
e se
rvi
c
e
3.
4.
Arrange
ment
based ac
cess c
o
ntrol
A FA
DE cu
st
o
m
er i
s
appr
ove
d t
o
get
t
o
j
u
st
t
h
e recor
d
s
w
hos
e rel
a
t
e
d st
rat
e
gi
es are dy
nam
i
c and
are fu
lfilled
b
y
th
e cu
sto
m
er.
It g
i
v
e
s em
it k
e
y to
th
e end
cl
ien
t
fo
r reco
rd
tran
sferring
and
d
o
wn
lo
ad
ing
[2
3
]
.
3.
4.
1.
Str
a
te
gies Re
newal
Is th
e term
id
en
tified
with
t
h
e en
tran
ce auth
oriza
tio
n
'
s wh
erei
n
a clien
t
so
licitatio
n
s
to
th
e clou
d
sup
e
r
v
i
s
o
r
t
o
gi
ve t
h
e a
p
p
r
o
aches ot
her t
h
an w
h
i
c
h are
bei
n
g di
st
ri
but
ed t
o
he/
h
er.
For t
h
e bl
oc
ke
d use
r
'
s
(Fraud
)
k
eep
i
n
g
in
min
d
th
e en
d
g
o
a
l to
h
a
ve ad
mittan
ce t
o
th
e assets put away in
th
e clo
u
d
serv
er
n
e
ed
's g
e
t
t
o
aut
h
ori
zat
i
o
n'
s whi
c
h a
r
e b
e
i
ng
gi
ve
n by
t
h
e cl
o
ud
di
rect
or
whe
n
t
h
e
bl
ocke
d cl
i
e
nt
g
o
es f
o
r as
ki
n
g
fo
r t
h
e
records.
3.
5.
Arrange
ment
based guar
anteed cancellati
on:
A d
o
c
u
m
e
nt
i
s
erased
(
o
r
fo
r
al
l
t
i
m
e
bl
ocke
d o
f
f
)
i
f
i
t
s
rel
a
t
e
d ap
pr
oac
h
e
s
are re
n
o
u
n
ce
d an
d
get
t
o
b
e
ou
t of d
a
te. Th
at is, reg
a
rd
less of th
e
p
o
ssib
ility th
at
a
record
du
p
licat
e th
at is co
nn
ected
with
renou
n
c
ed
arra
ngem
e
nt
s,
i
t
rem
a
i
n
s scra
m
b
l
e
d and
we
can'
t
reco
ver
t
h
e rel
a
t
i
n
g cr
y
p
t
o
g
r
a
phi
c
ke
y
s
t
o
rec
upe
rat
e
t
h
e
doc
um
ent
.
I
n
t
h
i
s
m
a
nner,
t
h
e rec
o
r
d
du
pl
i
c
at
e get
s
t
o
be
un
rec
ove
rabl
e
by
any
b
o
d
y
(c
ou
nt
i
n
g t
h
e
pr
op
ri
et
or
of the
docum
e
nt).
3.
6.
Time Perform
a
nce
of F
a
de
We first m
eas
ure t
h
e tim
e
e
x
ecution
of
our FADE
Pro
t
otyp
e. K
e
ep
ing in
min
d
th
e
en
d
go
al to
r
ecogn
ize th
e t
i
m
e
o
v
e
rh
ead
o
f
FAD
E
,
w
e
i
s
o
l
ate th
e
r
unnin
g
tim
e o
f
ev
er
y esti
m
a
tio
n
in
to
t
h
r
e
e seg
m
en
ts:
•
File tran
sm
issio
n
ti
m
e
, th
e transferring
/do
w
n
l
o
a
d
i
ng time for th
e i
n
fo
rm
atio
n
reco
rd
b
e
tween th
e
custom
er and t
h
e Cloud.
•
Metad
a
ta transmissio
n
ti
m
e
, th
e id
eal o
ppo
rt
u
n
ity
fo
r t
r
ansfe
rri
ng/
Do
wnl
o
adi
ng t
h
e
m
e
t
a
dat
a
, wh
i
c
h
contains the Policy data and
the crypt
o
gra
p
hic keys
related. W
i
t
h
the re
cord, betwee
n the
cust
om
er
and
the Cloud Service Provi
ders
.
•
Cryp
tog
r
aph
i
c o
p
e
ration
ti
me, th
e ag
greg
ate ti
me fo
r
cryptogra
phic operations,
th
is in
co
rp
orates t
h
e
ag
greg
ate co
mp
u
t
ation
a
l ti
me u
tilized
fo
r
p
e
rform
i
n
g
AES an
d
HMAC o
n
th
e record, an
d
th
e ideal
op
p
o
rt
uni
t
y
fo
r t
h
e cust
om
er t
o
or
gani
ze
w
i
t
h
t
h
e
m
a
jori
t
y
of key
chi
e
f
s
on
wo
r
k
i
n
g t
h
e cry
p
t
o
g
r
a
p
h
i
c
key
s
.
•
Files are
perm
anently inacces
sible base
d
on
policies.
4.
RESULTS
In
b
e
low,
we hav
e
shown
imp
l
em
en
tatio
n
resu
lts su
cci
n
c
tly fo
r better un
d
e
rstand
ing
i
n
th
e form
o
f
Fig
u
r
e
2
,
Figu
re 3
,
Figur
e
4
an
d Figur
e
5
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
I
J
ECE
Vo
l. 6
,
N
o
. 5
,
O
c
tob
e
r
20
16
:
233
8
–
23
44
2
342
Fi
gu
re
2.
H
o
m
e
pa
ge
Fi
gu
re
3.
A
d
m
i
n R
e
gi
st
rat
i
o
n
page
Fi
gu
re 4.
W
e
l
c
om
e
page
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
A Sec
u
re
d C
l
o
u
d
D
a
t
a
St
or
a
g
e w
i
t
h
Ac
cess
Pri
v
i
l
e
ges (
N
a
r
esh
Vur
u
k
o
n
d
a
)
2
343
Fi
gu
re
5.
Fi
l
e
a
ccess pa
ge
5.
CO
NCL
USI
O
N
In
This
System
we propose
d a
distributed clou
d data
st
ora
g
e fram
e
work brought
s
ecure
acces
s
bene
fi
t
o
v
er
cl
ou
d i
n
f
o
rm
at
i
on l
i
k
e F
A
DE,
It
t
e
l
l
s
abo
u
t
T
i
m
e
based
fi
l
e
assur
e
d
del
e
t
i
o
n a
nd
Va
ni
sh
dat
a
.
Whic
h m
eans to
give acce
ss c
ont
rol
guara
n
teed e
r
asure t
o
docum
e
nts that
are facilitated
by todays distribut
e
d
stora
g
e a
d
m
i
nistrations
. It
pa
rtner
doc
u
m
e
nts with rec
o
rd
access arrange
m
ents that control how rec
o
rds ca
n
be
got
t
e
n t
o
o.
An
d a
f
t
e
r
t
h
at
,
t
h
e
pre
s
ent
a
p
pr
oac
h
based
d
o
cum
e
nt
g
u
ara
n
t
eed
eras
ure
,
i
n
w
h
i
c
h
rec
o
r
d
s a
r
e
defi
ni
t
e
l
y
erased an
d
m
a
de unrec
o
v
er
ab
le by an
yb
od
y w
h
en
th
eir
r
e
la
ted doc
um
ent acc
ess arra
ngem
e
nts are
denie
d
.
Depict
the crucial operations
on c
r
yptogr
a
p
hic keys in order t
o
accom
p
lish access control and
g
u
a
ran
t
eed
can
cellatio
n
.
FADE ad
d
ition
a
l
l
y in
flu
e
n
c
es
ex
istin
g
cryp
t
o
grap
h
i
c strat
e
g
i
es, in
cl
u
d
i
n
g
t
h
e
pr
o
p
ert
y
cal
l
e
d at
t
r
i
but
e base
d encry
p
t
i
on
(
A
B
E
) an
d a
m
a
jo
ri
t
y
of key
sup
e
r
v
i
s
o
r
s t
a
k
i
ng i
n
t
o
acc
ou
nt
edge
mystery sharing. our resea
r
ch work
procee
ds in ens
u
ring the file access
cont
rol and ass
u
red
deletion in
m
u
lti
cl
ou
d e
nvi
ro
n
m
ent
and
re
d
u
ci
n
g
t
h
e
m
e
ta dat
a
m
a
nag
e
m
e
nt
, t
h
ere
by
t
h
e cl
ou
d
st
ora
g
e
becom
e
m
o
re
attractive and
many users
will adopt th
e cloud space in
order to
dim
i
nish th
e data stora
g
e cost, a
n
d also Files
whic
h a
r
e store
d
in Cloud are
perm
anently
inaccessible afte
r re
voking t
h
eir
policies.
REFERE
NC
ES
[1]
G
o
y
a
l V
.,
et al.
,
“Attribute-based
encr
y
p
tion for f
i
ne-grained
access control of encr
y
p
ted data,” in
Proc. of
the 13th
ACM con
f
er
en
ce
on Computer
an
d communicat
i
o
n
s
s
ecur
ity
, Oct
30, ACM, pp
. 89
-98, 2006
.
[2]
Bethen
court J.,
et al.
, “Ciphertext-policy
attr
ibu
t
e-based en
cr
y
p
tion,”
Insecurity and
Privac
y, 2007. SP'07. IEEE
Symposium on
,
May
20, pp. 321
-334, 2007
.
[3]
Tang Y.,
et a
l
.
, “FADE: Secure over
l
ay
cloud
storag
e
with f
i
le assured
del
e
t
i
on,”
in
S
ecurity and Privacy in
Communication Networks
, Sprin
g
er Ber
lin
Heidelberg, Sep 7
,
pp
.
380-397, 2010
.
[4]
Rahumed A.,
et al.
, “A secure cloud backup s
y
stem with a
ssured deletion and version control,” in
Parall
e
l
Processing Wor
k
shops (
I
CPPW), 2011
40th In
t.
Con. On
, Sep 13
, pp
. 160-167
, 2
011.
[5]
Gunasekhar T.,
et a
l
.
, “A Survey on Denial
of Se
rvice
Atta
cks.”
[6]
B. T. R
e
dd
y
,
et al.
, “A survey
o
n
assured f
ile deletion
in
cloud
en
vironment.”
[7]
N. Vurukonda and B. T. Rao, “
A
Study
on Data Storage Secur
ity
Issues in Cloud Computing,”
Pr
es
ented at th
e
Odisha, 2
nd
In
t. I
CCC-2016 Conf, Bhubaneswar,
Proc.
Else
viers-
Procedia
of
Computer Science,
Jan 24&25,
201
6
.
[8]
Mell P. and
Grance
T., “The NI
ST defin
ition
of
cloud
com
puting
.
”
[9]
Bold
y
r
eva A.
,
et al.
, “Iden
tity
-
b
a
sed encr
y
p
tion
w
ith effi
cien
t re
vocat
ion,”
in
Pr
oc. of
the 15
th ACM conferen
ce
on
Computer and communications s
ecurity
, ACM, O
c
t 27
, pp
. 417-42
6, 2008
.
[10]
Wang C.,
et al.
, “Privacy
-pr
e
serv
ing public auditing for data
storage security
in cloud computing,” in
INFOCOM,
2010 Proceedin
g
s IEEE
, Mar
14
, pp
. 1-9
,
2010
.
[11]
Wang W.,
et a
l
.
,
“
S
ecure and ef
f
i
ci
ent a
c
c
e
s
s
to outs
ourced da
ta
,
”
in
Proc. of
the 2009 ACM workshop on Cloud
computing security
, ACM, Nov
1
3
, pp
. 55-66
, 20
09.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
I
J
ECE
Vo
l. 6
,
N
o
. 5
,
O
c
tob
e
r
20
16
:
233
8
–
23
44
2
344
[12]
Y
u
S
.,
et a
l
.
, “Attribute based
data shar
ing
with attr
ibute
revo
cation,” in
Proc. of th
e 5th
AC
M Symposium on
Information, Co
mputer and Com
m
unications S
e
curity
, ACM, Apr
13, pp. 261-270
, 2010
.
[13]
K.
Sastry
,
et al.
, “Novel Approa
ch for Control Data
Thef
t Attack in Cloud Computing,”
In
tern
ational Journal
of
Electrica
l
and
C
o
mputer Engin
e
ering,
vo
l/issue:
5(6), 2015
.
[14]
Shu X. and
Li X
.
, “A Scalab
le an
d Robust DHT P
r
otocol for Stru
ctured P2P Netw
ork.”
[15]
M. Sadasivam and R.
Dharmaraj, “SADS–Self A
nnihilating Data Stor
age s
y
stem in Cloud Storage
Se
rvi
c
e,
”
Intern
ational Journal of
Information
&
C
o
mputation Technology
, pp
.
0974-2239.
[16]
Yun A.,
et al.
, “On protecting in
tegrity
and confid
entiality
of cr
yptographic file s
y
s
t
em
for outs
ourced s
t
orage
,
” i
n
Proc. o
f
the 200
9 ACM worksho
p
on Cloud
com
puting security
,
ACM, Nov 13, p
p
. 67-76
, 2009
.
[17]
Ruj S
.,
et al.
, “
D
ecentr
ali
zed a
c
ces
s
control wit
h
anon
y
m
ous
authenti
ca
tion of data s
t
ored in
clo
uds
,”
Paralle
l and
Distributed S
y
stems, IEEE Transactions on
.
, vol/issue: 25(2), pp.
384-94, 2014
.
[18]
W
a
n Z.,
et al.
,
“
H
AS
BE: a hier
archi
cal
att
r
ibut
e-bas
e
d s
o
lut
i
on
for flexib
le and
s
calab
le a
c
c
e
s
s
control in
clou
d
computing,”
Information Forens
ics and S
ecurity, IEEE Transactions on.
, vol/issue: 7(2)
, pp
. 743-
54, 2012
.
[19]
Jay
a
lekshmi M. B. and Krishnaveni S.
H., “A St
ud
y
of Data Stor
age Security
Iss
u
es in Cloud Computing,”
India
n
Journal of Scien
ce and
Techno
lo
gy,
vo
l/issue: 8(
24), 2015
.
[20]
Rani N.
A.,
et
al
.
, “A Survey
o
n
Data Redund
ancy
Check
in a
H
y
brid Cloud
b
y
using Conv
er
gent En
cr
y
p
tion
,
”
Indian Journal o
f
Sc
ience and
Technology,
vo
l/issue: 9(4)
, 2016
.
[21]
Saikeer
thana R.
and Umamakeswari A.,
“Secur
e
Data Storag
e
and Data Retrieval in
Cloud Sto
r
age using C
i
ph
er
Policy
Attribute
based En
cr
y
p
tio
n
,”
Ind
i
an
Journal of Science an
d Technolog
y,
v
o
l/issue: 8
(
S9), p
p
. 318-25
, 2015
.
[22]
T. Gunasekhar
,
et al
., “Mitigatio
n of Insider Attacks through Multi-Cloud,”
International Journal
of Electrical an
d
Computer Engin
eering,
vol/issue: 5(1), pp. 136, 2
015.
[23]
Yang T.,
et al.
, “A
Secure Ciph
er text Self-D
estruction
Scheme
with Attribute-B
a
sed Encr
y
p
tion,”
Mathematical
Pr
oblems
in
Eng
i
neer
ing
,
2015
.
Evaluation Warning : The document was created with Spire.PDF for Python.