Skip to main content

Access Control Mechanism for Cloud Data Using Block Chain and Proxy Re-Encryption

  • Conference paper
  • First Online:
Data Science and Intelligent Applications

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 52))

  • 1565 Accesses

Abstract

This paper studies block chain and proxy re-encryption methods in our system. Block chain provides transparent property and serves privacy and confidentiality to the system. The storage of block chain can be a barrier for implementing the records in the system. Moreover, it is difficult to store the large amount of data exceeding into the practical storage capabilities of the current block chain usages. The most important issues of block chain are the performance, limited storage, privacy, energy consumption and scalability. Using normal public-key encryption, User A (data owner) needs to download and decrypt the requested data and then re-encrypts data using the target user’s public key. This process requires extra computation cost and communication to the data. Another solution for this is to allow data owners to define access policies and encrypt the data with encryption under the access policies; only authenticated users whose keys are matching their policies can decrypt the ciphertext. But the thing is here data owner needs to download, decrypt, and re-encrypt the requested data in case data access policies change dynamically and frequently. To overcome these drawbacks, in this paper our system proposed a proxy re-encryption scheme that gives solutions for securing data and sharing in cloud computing environment. This system will reduce communication cost and extra computational cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jin Ho P, Hyuk P (2017) Blockchain security in cloud computing: use cases, challenges, and solutions. Symmetry 9:1–13

    Google Scholar 

  2. Li X, Jiang P, Chen T, Luo X, Wen Q (2017) A survey on the security of blockchain systems. Future Gener Comput Syst

    Google Scholar 

  3. Zyskind G, Nathan O et al (2015) Decentralizing privacy: using blockchain to protect personal data. In: Security and privacy workshops (SPW), IEEE, pp 180–184

    Google Scholar 

  4. Zheng Z, Xie S, Dai H, Wang H Blockchain challenges and opportunities: a survey. Work Pap

    Google Scholar 

  5. Verma D, Desai N, Preece A, Taylor I A blockchain based architecture for asset management in coalition operations. SPIE

    Google Scholar 

  6. Gierschner F, Beyond B (2018) Consumers and health information technology: a national survey. In: California Health Care Foundation

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Umangi Mistry .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mistry, U., Patel, R. (2021). Access Control Mechanism for Cloud Data Using Block Chain and Proxy Re-Encryption. In: Kotecha, K., Piuri, V., Shah, H., Patel, R. (eds) Data Science and Intelligent Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 52. Springer, Singapore. https://doi.org/10.1007/978-981-15-4474-3_44

Download citation

Publish with us

Policies and ethics