Open Access Open Access  Restricted Access Subscription or Fee Access

Dynamic Updating Policies for Access Control in Cloud Computing

Deepshikha Porwal


Attribute Based Encryption (ABE) is very important technique for maintaining the security of the information in the cloud system, however policy updating with the help of attribute based encryption in a cloud is a very tough job for constructing access control schemes. In this project I am just trying to let the data owners can check the old access policy in the cloud and re- encrypt the data under new access policy if needed and then send the data again to the cloud. Usually this method can cause the high communication blockage and heavy computation burden. But in this paper I am proposing a novel scheme for dynamic policy updating with efficient access control in the cloud. I am trying to make policy updating method for ABE systems; this method can avoid the transmission of encoded data with old access policy. Finally, I am proposing an effective and secure methodology which will help the data owner to check whether the cloud server updated the encoded data correctly or not.


Policy Updating, Outsourcing, Access Control, ABAC, ABE, Cloud.

Full Text:



. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption For fine-grained access control of encrypted data,” in CCS’06. ACM, 2006, pp. 89–98.

. J. Bettencourt, A. Sahai, and B. Waters, “Cipher text-policy attribute based Encryption,” in S&P’07. IEEE, 2007, pp. 321–334.

. B. Waters, “Cipher text-policy attribute-based encryption: An expressive, efficient, and provably secure realization,” in PKC’11. Springer, 2011, pp. 53–70.

. A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, “Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,” in EUROCRYPT’10. Springer, 2010, pp. 62–91.

. A. B. Lewko and B. Waters, “Decentralizing attribute-based encryption,” in EUROCRYPT’11. Springer, 2011, pp. 568–588.

. S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in INFOCOM’10. IEEE, 2010, pp. 534–542.

. K. Yang, X. Jia, and K. Ren, “Attribute-based fine-grained access control with efficient revocation in cloud storage systems,” in AsiaCCS’13.ACM, 2013, pp. 523–528.

. K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, “DAC-MACS: Effective Data Access Control for Multi authority Cloud Storage Systems,” IEEE Trans. Info. Forensics Security, vol. 8, no. 11, pp. 1790–1801, 2013.

. K. Yang and X. Jia, “Expressive, efficient, and revocable data access control for multi-authority cloud storage,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1735–1744, July 2014.

. A. Sahai, H. Seyalioglu, and B. Waters, “Dynamic credentials and cipher text delegation for attribute-based encryption,” in CRYPTO’12. Springer, 2012, pp. 199–217.

. V.Kalpana, “Updating Policy with Access Control Using Multi Authority in the Cloud”, International Journal of Science and Research (IJSR) 2013, ISSN (Online): 2319-7064.

. R.Nallakumar, “A SURVEY ON POLICY UPDATE OUTSOURCING FOR BIG DATA ACCESS CONTROL IN THE CLOUD”, International Journal of Contemporary Research in Computer Science and Technology (IJCRCST) 2015, Volume1, Issue 8.

. Sultan Ullah, “TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing”, International Journal of Computer Applications 2013, Volume 62– No.2.

. N. Mahesh kumar, “Auditing Services in Cloud Computing for Achieving Data Access Control”, IOSR Journal of Computer Engineering (IOSR-JCE), 2014, Volume

. K. Yang and X. Jia, “Attributed-based access control for multi-authority systems in cloud storage,” in ICDCS’12. IEEE, 2012, pp. 1–10.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.