Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Revocation based Access Control with Anonymous Authentication for Decentralized Cloud

Print
PDF
IJCA Proceedings on National Conference on Advances in Computing, Communication and Networking
© 2016 by IJCA Journal
ACCNET 2016 - Number 1
Year of Publication: 2016
Authors:
Taramati Taji
Sayali Kedari
Soundarya Gajjam
Snehal Bhadvankar
Sonali Sakhare

Taramati Taji, Sayali Kedari, Soundarya Gajjam, Snehal Bhadvankar and Sonali Sakhare. Article: Revocation based Access Control with Anonymous Authentication for Decentralized Cloud. IJCA Proceedings on National Conference on Advances in Computing, Communication and Networking ACCNET 2016(1):26-30, June 2016. Full text available. BibTeX

@article{key:article,
	author = {Taramati Taji and Sayali Kedari and Soundarya Gajjam and Snehal Bhadvankar and Sonali Sakhare},
	title = {Article: Revocation based Access Control with Anonymous Authentication for Decentralized Cloud},
	journal = {IJCA Proceedings on National Conference on Advances in Computing, Communication and Networking},
	year = {2016},
	volume = {ACCNET 2016},
	number = {1},
	pages = {26-30},
	month = {June},
	note = {Full text available}
}

Abstract

Cloud based technology is the modern technology that can provide the data availability anywhere at any time. Day by day large amount of data can be processed by the cloud; Issue to be focused on cloud system is the Security. we are proposing an authentication for anonymous user and providing access control for every valid user by decentralized way. There are various cloud based system that provides an centralized access control, proposed system focuses on decentralized access control system that using multiple KDC's. every authorized user can get authorized key for accessing data stored in cloud The data stored in cloud is in encrypted format and only authorized user can have valid key to decrypt the data. Proposed system focuses on security of data stored in cloud. System is secure and robust that only valid user can read, write and manipulate the data stored in cloud. Anonymous user can also have the authentication key to access the cloud. User can anonymous to other user not for the cloud. Theprocess of revocation is an added feature of our proposed system.

References

  • "Review of Cloud Storage in Privacy Access Control",International Journal of Advanced Research in Computer Science and Software Engineering ,Volume 4, Issue 3, March 2014 .
  • "Anonymous Authentication for Decentralized Access Control of Cloud data ", International Journal of Advance Research in Computer Science and Management Studies ,Volume 2, Issue 11, November 2014.
  • "Cloud Data Security using Authentication and Encryption Technique",International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)Volume 2, Issue 7, July 2013.
  • "Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases",IEEE transactions on parallel and distributed systems, vol. 25, no. 2, february 2014.
  • "Anonymous Authentication of Decentralized Access Control of Data Stored in Cloud", International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 3 Issue: 4(2015).
  • "Cloud Computing: Security Issues and Research Challenges" ,IRACST - International Journal of Computer Science and Information Technology and Security (IJCSITS) Vol. 1, No. 2, December 2011 .
  • "A Consolidated Authentication Model in Cloud Computing Environments" , International Journal of Multimedia and Ubiquitous Engineering Vol. 7, No. 3, July, 2012 .
  • "Securing Mobile Cloud Using Finger Print Authentication",International Journal of Network Security and Its Applications (IJNSA), Vol. 5, No. 6, November 2013.
  • "CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD",International Journal of Network Security and Its Applications (IJNSA), Vol. 6, No. 1, January 2014.
  • "Cloud Computing: Overview and Current Research Challenges" ,IOSR Journal of Computer Engineering (IOSR-JCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 8, Issue 1 (Nov. - Dec. 2012).
  • "ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT",VOL. 7, NO. 5, MAY 2012 ISSN 1819-6608ARPN Journal of Engineering and Applied Science.