Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

A Secure Cloud Computing using Decentralized Access Control with Anonymous Authentication and User Revocation

Print
PDF
IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing
© 2016 by IJCA Journal
ICINC 2016 - Number 1
Year of Publication: 2016
Authors:
Priyanka D. Varma
Vaishali Maheshkar

Priyanka D Varma and Vaishali Maheshkar. Article: A Secure Cloud Computing using Decentralized Access Control with Anonymous Authentication and User Revocation. IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing ICINC 2016(1):1-5, July 2016. Full text available. BibTeX

@article{key:article,
	author = {Priyanka D. Varma and Vaishali Maheshkar},
	title = {Article: A Secure Cloud Computing using Decentralized Access Control with Anonymous Authentication and User Revocation},
	journal = {IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing},
	year = {2016},
	volume = {ICINC 2016},
	number = {1},
	pages = {1-5},
	month = {July},
	note = {Full text available}
}

Abstract

A Secure cloud computing is been proposed using access control which is attribute based encryption along with unspecified authentication of the user from security point of view and user revocation. In proposed system two key distribution centers are used and number of KDC can be increased depending on how many users are there. Decentralized approach is used in this paper as this approach proves to be successful from security as well as scalability point of view. Existing system use only one storage server in cloud which can fail in any random way which causes loss of data for this purpose in proposed system four servers are used in order to avoid such problems and keep backup of the data.

References

  • S. Ruj, M. Stojmenovic and A. Nayak, "Decentralizedaccess Control authentication of data stored inClouds,"IEEE which isAnonymous transactions, vol 25, No. 2, Feb 2014.
  • J. Li, O. Wang, C. Wang, N. cao, K. Ren, and W. Lou,"FuzzyKeyword Search over Data which is encrypted in Cloud Computing, "Proc. IEEE INFOCOM, pp. 441-445, 2010
  • C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou, "Secure and Dependable Storage Services in Cloud Computing,"IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, April-June 2012.
  • S. Kamara and K. Lauter,"Storage of Cryptographic Cloud,"Proc. 14th Int'l Conf. Financial Cryptography and Data Security, pp. 136-149, 2010.
  • H. Li, Y. Dai, L. Tian, and H. Yang,"Identity-Based Authentication of Cloud Computing," Proc First Int'l Conf. Cloud Computing (CLoudCom), pp, 157-166, 2009
  • C. Gentry,"Fully Homomorphic Encryption Scheme, "PhD Stanford Univ. ,http://www. crypto. stanford. edu/Craig,2009
  • A. R. Sadeghi, T. Schneider, and M. Winandy,"Cloud Computing which is Token-Based, "Proc. Third Int'l Conf. Trust and Trustworthy Computing (TRUST), pp. 417-429, 2010
  • H. K. Maji, M. Prabhakaran, and M. Rosulek, "Attribute-Based Signatures: Achieving Collusion Resistance and Attribute-Privacy,"IACR Cryptology ePrint Archive, 2008.
  • F. Zhao, T. Nishide, and K. Sakurai,"Realizing Fine-Grained and Flexible Access Control for the OutsourcedData with attribute based cryptosystems,"Proc Seventh Int'lconf. information security practice and experience(ISPEC), pp. 83-97, 2011.
  • D. R. Kuhn, E. J. Coyne, and T. R. Weil, "Adding theAttributes to Role-Based Access Control," IEEE Computer, vol. 43, no. 6, pp. 79-81, June 2010.
  • M. Li, S. Yu,K. Ren, and W. Lou,"In Cloud Computing Securing Personal Health Records: Patient-Centric andFine-Grained Data Access Control in Multi Owner Settings," Proc. Sixth Int'l ICST Conf. Security and Privacy in Comm. Networks (SecureComm), pp. 89- 106, 2010.
  • S. Yu, C. Wang, K. Ren, and W. Lou, "The Attribute Based Data Sharing with Attribute Revocation," Proc. ACM Symp InformationComputer and Comm. Security (ASIACCS), pp. 261-270, 2010.
  • G. Wang, Q. Liu, and J. Wu, "Hierarchical AttributeWhich is based on Encryption for the Fine-Grained Access Control in CloudnStorage Services,"Proc. 17th ACM Conf. Computer and Comm. Security (CCS), pp. 735-737, 2010.
  • F. Zhao, T. Nishide, and K. Sakurai, "Realizing Fine-Grained and Flexible Access Control to the Data which is outsourced withAttribute-Based Cryptosystems," Proc. Seventh Int'l Conf. Information Security Practice and Experience (ISPEC), pp. 83-97, 2011