CFP last date
21 October 2024
Reseach Article

Revocation based Access Control with Anonymous Authentication for Decentralized Cloud

Published on June 2016 by Taramati Taji, Sayali Kedari, Soundarya Gajjam, Snehal Bhadvankar, Sonali Sakhare
National Conference on Advances in Computing, Communication and Networking
Foundation of Computer Science USA
ACCNET2016 - Number 1
June 2016
Authors: Taramati Taji, Sayali Kedari, Soundarya Gajjam, Snehal Bhadvankar, Sonali Sakhare
bc920b7d-ccf3-4071-b4f0-a81b2801a8e4

Taramati Taji, Sayali Kedari, Soundarya Gajjam, Snehal Bhadvankar, Sonali Sakhare . Revocation based Access Control with Anonymous Authentication for Decentralized Cloud. National Conference on Advances in Computing, Communication and Networking. ACCNET2016, 1 (June 2016), 26-30.

@article{
author = { Taramati Taji, Sayali Kedari, Soundarya Gajjam, Snehal Bhadvankar, Sonali Sakhare },
title = { Revocation based Access Control with Anonymous Authentication for Decentralized Cloud },
journal = { National Conference on Advances in Computing, Communication and Networking },
issue_date = { June 2016 },
volume = { ACCNET2016 },
number = { 1 },
month = { June },
year = { 2016 },
issn = 0975-8887,
pages = { 26-30 },
numpages = 5,
url = { /proceedings/accnet2016/number1/24973-2259/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing, Communication and Networking
%A Taramati Taji
%A Sayali Kedari
%A Soundarya Gajjam
%A Snehal Bhadvankar
%A Sonali Sakhare
%T Revocation based Access Control with Anonymous Authentication for Decentralized Cloud
%J National Conference on Advances in Computing, Communication and Networking
%@ 0975-8887
%V ACCNET2016
%N 1
%P 26-30
%D 2016
%I International Journal of Computer Applications
Abstract

Cloud based technology is the modern technology that can provide the data availability anywhere at any time. Day by day large amount of data can be processed by the cloud; Issue to be focused on cloud system is the Security. we are proposing an authentication for anonymous user and providing access control for every valid user by decentralized way. There are various cloud based system that provides an centralized access control, proposed system focuses on decentralized access control system that using multiple KDC's. every authorized user can get authorized key for accessing data stored in cloud The data stored in cloud is in encrypted format and only authorized user can have valid key to decrypt the data. Proposed system focuses on security of data stored in cloud. System is secure and robust that only valid user can read, write and manipulate the data stored in cloud. Anonymous user can also have the authentication key to access the cloud. User can anonymous to other user not for the cloud. Theprocess of revocation is an added feature of our proposed system.

References
  1. "Review of Cloud Storage in Privacy Access Control",International Journal of Advanced Research in Computer Science and Software Engineering ,Volume 4, Issue 3, March 2014 .
  2. "Anonymous Authentication for Decentralized Access Control of Cloud data ", International Journal of Advance Research in Computer Science and Management Studies ,Volume 2, Issue 11, November 2014.
  3. "Cloud Data Security using Authentication and Encryption Technique",International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)Volume 2, Issue 7, July 2013.
  4. "Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases",IEEE transactions on parallel and distributed systems, vol. 25, no. 2, february 2014.
  5. "Anonymous Authentication of Decentralized Access Control of Data Stored in Cloud", International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 3 Issue: 4(2015).
  6. "Cloud Computing: Security Issues and Research Challenges" ,IRACST - International Journal of Computer Science and Information Technology and Security (IJCSITS) Vol. 1, No. 2, December 2011 .
  7. "A Consolidated Authentication Model in Cloud Computing Environments" , International Journal of Multimedia and Ubiquitous Engineering Vol. 7, No. 3, July, 2012 .
  8. "Securing Mobile Cloud Using Finger Print Authentication",International Journal of Network Security and Its Applications (IJNSA), Vol. 5, No. 6, November 2013.
  9. "CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD",International Journal of Network Security and Its Applications (IJNSA), Vol. 6, No. 1, January 2014.
  10. "Cloud Computing: Overview and Current Research Challenges" ,IOSR Journal of Computer Engineering (IOSR-JCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 8, Issue 1 (Nov. - Dec. 2012).
  11. "ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT",VOL. 7, NO. 5, MAY 2012 ISSN 1819-6608ARPN Journal of Engineering and Applied Science.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Storage Access Control Key Distribution Center Encryption Decryption Authentication Validation revocation. .