the period of validity t (time stamp) associated with
each file.
7 CONCLUSIONS
In this paper, we defined a new framework for data
security in cloud storage services. Through this
framework, we were able to achieve data
confidentiality and fine grained access control by
delegating key management and enforcement access
control to a TTP with minimal overhead on cloud
users .Our framework was also able to conquer two
of most important outsourced data sharing attacks:
replay attacks and collusion attacks. In addition, our
scheme was able to shift most of the extensive
computation load to the cloud. Our future work is to
evaluate this system and implement it in a real
application to prove its efficiency.
REFERENCES
Bethencourt J., Sahai A., and Waters B., 2007. Cipher-
text-policy attribute based encryption. In 28th IEEE
Symposium on Security and Privacy.
Borgmann M., Hahn T., Herfert M., Kunz T., Richter M.,
Viebeg U., and Vowe S., 2012. On the Security of
Cloud Storage Services. Fraunhofer Institute for Se-
cure Information Technology SIT. Available from:
http://www.sit.fraunhofer.de/en/cloudstudy.html html
[Accessed 6 March 2014].
Cao D., Zhao B., Wang X., Su J., and Ji G., 2011. Multi-
authority Attribute-Based Signature. In INCoS '11,
Third International Conference on Intelligent
Networking and Collaborative Systems.
Chacos B., How to encrypt your cloud storage for free.
PCWorld. Available from:
http://www.pcworld.com/article/2010296/how-to-
encrypt-your-cloud-storage-for-free.html [Accessed 6
February 2014].
Chase M., 2007. Multi-authority attribute-based
encryption. In TCC’ 07, The Fourth Theory of
Cryptography Conference.
Chase M. and Chow S.M., 2009. Improving privacy and
security in multi-authority attribute-based encryption.
In CCS '09, 16th ACM conference on Computer and
communications security.
CircleID Reporter, 2009. Survey: Cloud computing 'no
hype', but fear of security and control slowing
adoption. Available from:
http://www.circleid.com/posts/20090226_cloud_comp
uting_hype_security [Accessed 7 January 2014].
Dahshan M. and Elkassass S. 2014. Data Security in
Cloud Storage Services. In CLOUD
COMPUTING’14, The Fifth International Conference
on Cloud Computing, GRIDs, and Virtualization.
Deniability P., Gasti P., Ateniese G., and Blanton M.,
2010. Deniable cloud storage: sharing files via public-
key deniability. In WPES '10, 9th annual ACM
workshop on Privacy in the electronic society.
Di Vimercati S. D. C., Foresti S., Jajodia S., Paraboschi S.,
and Samarati P., 2007. A data outsourcing architecture
combining cryptography and access control. In CSAW
’07, ACM workshop on Computer security
architecture.
Goh E., Shacham H., Modadugu N., and Boneh D., 2003.
SiRiUS: Securing remote untrusted storage. In
NDSS'03 , Tenth Network and Distributed System
Security Symposium.
Hu W., Yang T., and Matthews J. N, 2010. The good, the
bad and the ugly of consumer cloud storage. In ACM
SIGOPS'10, Operating Systems Review.
Jung T., Li X., Wan Z., and Wan M., 2013. Privacy
preserving cloud data access with multi- authorities.
InINFOCOM’13, 33rd IEEE International Conference
on Computer Communications.
Lewko A. and Waters B., 2011. Decentralizing attribute-
based encryption. In Proceedings of EUROCRYPT'11,
30th Annual International Conference on the Theory
and Applications of Cryptographic Techniques.
Liu Z., Cao Z., Huang Q., Wong D. S., and Yuen T.
H.,2011. Fully secure multi-authority ciphertext-policy
attribute-based encryption without random oracles. In
ESORICS’11, The European Symposium on Research
in Computer Security.
Muller S., Katzenbeisser S., and Eckert C.,2009. On multi-
authority ciphertext-policy attribute-based encryption.
In Bulletin of the Korean Mathematical Society.
Newton, D. 2011. Dropbox authentication: insecure by
design. Available from:
http://dereknewton.com/2011/04/dropbox-
authentication-static-host-ids/[Accessed 17 February
2014].
Patel H. R., Patel D., Chaudhari J., Patel S., and Prajapati
K., 2012. Tradeoffs between performance and security
of cryptographic primitives used in storage as a service
for cloud computing. In CUBE '12, 2012
International Information Technology Conference.
Sahai A., and Waters B.,2005. Fuzzy Identity-based
Encryption. In EUROCRYPT'05, 24th Annual
International Conference on the Theory and
Applications of Cryptographic Techniques.
ShinJ., KimY., ParkW., and ParkC., 2012. DFCloud: A
TPM-based secure data access control method of
cloud storage in mobile devicesIn CloudCom’12,
IEEE 4th International Conference on Cloud
Computing Technology and Science.
Sosinsky, B., 2010. Cloud Computing Bible. John Wiley
& Sons. First Edition.
Tang Y., Lee P. P. C., Lui J. C. S., and Perlman R., 2012.
Secure Overlay Cloud Storage with Access Control
and Assured Deletion. In Proc. of TDSC’12, 2012
IEEE Transactions on Dependable and Secure
Computing.
Waters B., 2011. Ciphertext-policy attribute-based
encryption: An expressive, efficient, and provably
FrameworkforSecuringDatainCloudStorageServices
273