This paper, proposes a new Secure Cloud Data as an enhancement for the framework model in data security and cloud storage model by integrating the dual system encryption technology with selective proof technique. While the introduced scheme supporting any standard access structures is built in the composite structure bilinear group, it is verified adaptively CCA secure in the standard technique without threatening the expressiveness of access policy. In this paper, we attempt in addition to make an enhancement for the model to obtain more efficiency in the re-encryption key generation and re-encryption phases. Proxy Re-Encryption (PRE) is an effective cryptographic essential model that permits a data owner to nominee the access rights of the encrypted data which are stored on a cloud storage system to remaining entities without leaking the information of the data to the honest-butcurious cloud server. It implements the effectiveness for data sharing as the data owner even working with limited resource devices (e.g. mobile devices) can offload most of the computational activity to the cloud. Since its establishment many variants of PRE have been recommended and proposed. SecRBAC Based Proxy Re-Encryption (SecRBAC -ABPRE), which is observed as a regular approach for PRE, engages the PRE technology in the attribute-based encryption cryptographic framework as like that the proxy is granted to make change an encryption down an access policy to another encryption under a new access policy. CP-ABPRE is suitable to numerous real time network appliances, like sharing secure data in the network or cloud applications.Copy Right, IJAR, 2016,. All rights reserved. ……………………………………………………………………………………………………....
Introduction:-Cloud computing [1], which has received considerable attention from research communities in academia as well as industry, is a distributed computation model over a large pool of shared-virtualized computing resources, such as storage, processing power, applications and services. Cloud users are provisioned and release recourses as they want in cloud computing environment. This kind of new computation model represents a new vision of providing computing services as public utilities like water and electricity. Cloud computing brings a number of benefits for cloud users. For example, (1) Users can reduce capital expenditure on hardware, software and services because they pay only for what they use; (2) Users can enjoy low management overhead and immediate access to a wide range of applications; and (3) Users can access their data wherever they have a network, rather than having to stay nearby their computers. However, there is a vast variety of barriers before cloud computing can be widely deployed.Corresponding Author:-Sadeer Dheyaa Abdulameer Address:-Faculty of computer science, Cihan university, sulaimaniya Kurdistan, Iraq .
ISSN: 2320-5407Int. J. Adv. Res. 5(1), 1480-1488 1481 A recent survey by Oracle referred the data source from international data corporation enterprise panel, showing that security re...