ENABLING ANONYMOUS ENDORSEMENT IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL

sivaram, m ENABLING ANONYMOUS ENDORSEMENT IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL. International Journal of Scientific Engineering and Applied Science (IJSEAS), 2015, vol. 1, n. 3, pp. 397-401. [Journal article (Paginated)]

[thumbnail of 1.pdf]
Preview
Text
1.pdf

Download (151kB) | Preview

English abstract

A decentralized access control scheme for data storage in clouds that supports anonymous authentication authentication. In this scheme, the cloud checks the validity of the series without knowing the user's identity before storing data. It also has the added feature of access control in which only valid users are able to decrypt the stored information. This prevents replay attacks and supports conception, variation, and reading data stored in the cloud. It also supports user revocation . This is an important property because a user, revoked of its attributes, might no longer be able to write to the cloud. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches.

Item type: Journal article (Paginated)
Keywords: cloud,networking
Subjects: L. Information technology and library technology > LB. Computer networking.
Depositing user: Dr sivaram murugan
Date deposited: 21 Apr 2019 03:01
Last modified: 21 Apr 2019 03:01
URI: http://hdl.handle.net/10760/34366

References

] S. Ruj, M. Stojmenovic, and A. Nayak, "Privacy

Preserving Access Control with Authentication for

Securing Data in Clouds," Proc. IEEE/ACM Int'l

Symp. Cluster, Cloud and Grid Computing, pp.

556-563, 2012.

[2] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou,

"Toward Secure and Dependable Storage Services

in Cloud Computing," IEEE Trans. Services

Computing, vol. 5, no. 2, pp. 220-232, Apr.-June

2012.

[3] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W.

Lou, "Fuzzy Keyword Search Over Encrypted

Data in Cloud Computing," Proc. IEEE INFOCOM,

pp. 441-445, 2010.

[4] S. Kamara and K. Lauter, "Cryptographic Cloud

Storage," Proc. 14th Int'l Conf. Financial

Cryptography and Data Security, pp. 136-149, 2010.

[5] H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-Based

Authentica-tion for Cloud Computing," Proc. First

Int'l Conf. Cloud Computing (CloudCom), pp. 157-

166, 2009.

[6] C. Gentry, "A Fully Homomorphic Encryption

Scheme," PhD dissertation, Stanford Univ.,

http://www.crypto.stanford.edu/ craig, 2009.

[7] A.-R. Sadeghi, T. Schneider, and M. Winandy,

"Token-Based Cloud Computing," Proc. Third Int'l

Conf. Trust and Trustworthy Computing (TRUST),

pp. 417-429, 2010.

[8] R.K.L. Ko, P. Jagadpramana, M. Mowbray, S.

Pearson, M. Kirchberg, Q. Liang, and B.S. Lee,

"Trustcloud: A Framework for Accountability

and Trust in Cloud Computing," HP Technical

Report HPL-2011-

38, http://www.hpl.hp.com/techreports/ 2011/HPL-

2011-38.html, 2013.

[9] R. Lu, X. Lin, X. Liang, and X. Shen, "Secure

Provenance: The Essential of Bread and Butter of

Data Forensics in Cloud Computing," Proc. Fifth

400

International Journal of Scientific Engineering and Applied Science (IJSEAS) - Volume-1, Issue-3, June 2015

ISSN: 2395-3470

www.ijseas.com

ACM Symp. Information, Computer and Comm.

Security (ASIACCS), pp. 282-292, 2010.

[10] D.F. Ferraiolo and D.R. Kuhn, "Role-Based Access

Controls," Proc. 15th Nat'l Computer Security Conf,

1992.

[11] D.R. Kuhn, E.J. Coyne, and T.R. Weil, "Adding

Attributes to Role-Based Access Control," IEEE

Computer, vol. 43, no. 6, pp. 79-81, June 2010.

[12] M. Li, S. Yu, K. Ren, and W. Lou, "Securing

Personal Health Records in Cloud Computing:

Patient-Centric and Fine-Grained Data Access

Control in Multi-Owner Settings," Proc. Sixth Int'l

ICST Conf Security and Privacy in Comm. Networks

(SecureComm), pp. 89-106, 2010.

[13] S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute

Based Data Sharing with Attribute Revocation,"

Proc. ACM Symp. Information, Computer and

Comm. Security (ASIACCS), pp. 261-270, 2010.

[14] G. Wang, Q. Liu, and J. Wu, "Hierarchical AttributeBased

Encryption for Fine-Grained Access Control in

Cloud Storage Services," Proc. 17th ACM Conf.

Computer and Comm. Security (CCS), pp. 735-737,

2010.

[15] F. Zhao, T. Nishide, and K. Sakurai, "Realizing FineGrained

and Flexible Access Control to Outsourced

Data with Attribute-Based Cryptosystems," Proc.

Seventh Int'l Conf. Information Security Practice and

Experience (ISPEC), pp. 83-97, 201


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item