CFP last date
20 December 2024
Reseach Article

Decentralized Way to Manage with Secret Validation of Information Stored in Clouds

by M.nanda Kishore, V.mounika, V.divya Bharathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 6
Year of Publication: 2015
Authors: M.nanda Kishore, V.mounika, V.divya Bharathi
10.5120/21234-3987

M.nanda Kishore, V.mounika, V.divya Bharathi . Decentralized Way to Manage with Secret Validation of Information Stored in Clouds. International Journal of Computer Applications. 120, 6 ( June 2015), 38-40. DOI=10.5120/21234-3987

@article{ 10.5120/21234-3987,
author = { M.nanda Kishore, V.mounika, V.divya Bharathi },
title = { Decentralized Way to Manage with Secret Validation of Information Stored in Clouds },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 6 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 38-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number6/21234-3987/ },
doi = { 10.5120/21234-3987 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:05:33.053270+05:30
%A M.nanda Kishore
%A V.mounika
%A V.divya Bharathi
%T Decentralized Way to Manage with Secret Validation of Information Stored in Clouds
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 6
%P 38-40
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

We offer a replacement redistributed thanks to manage theme for secure information storage in clouds that supports secret validation. Within the planned theme, the cloud verifies the validity of the series while not knowing the user's identity before storing information. Our theme additionally has the added feature of contact rule that solely valid users are able to decipher the keep info. The theme prevents replay attacks and supports creation, modification, and reading information keep within the cloud. We tend to additionally address user revocation. Also, our verification and access management theme is redistributed and robust, in contrast to alternative access management schemes designed for clouds that are centralized. The communication, computation, and storage overheads are appreciate centralized approaches.

References
  1. A. Sahai and B. Waters, "Fuzzy Identity-Based Encryption," Proc. Ann. Int'l Conf. Advances in Cryptology (EUROCRYPT), pp. 457-473, 2005.
  2. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, "Toward Secure and Dependable Storage Services in Cloud Computing," IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr. -June 2012.
  3. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy Keyword Search Over Encrypted Data in Cloud Computing," Proc. IEEE INFOCOM, pp. 441-445, 2010.
  4. S. Kamara and K. Lauter, "Cryptographic Cloud Storage," Proc. 14th Int'l Conf. Financial Cryptography and Data Security, pp. 136-149, 2010.
  5. H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-Based Authentication for Cloud Computing," Proc. First Int'l Conf. Cloud Computing (CloudCom), pp. 157-166, 2009.
  6. M. Green, S. Hohenberger, and B. Waters, "Outsourcing the Decryption of ABECiphertexts," Proc. USENIX Security Symp. , 2011.
  7. H. K. Maji, M. Prabhakaran, and M. Rosulek, "Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance," IACR Cryptology ePrint Archive, 2008.
  8. M. Chase, "Multi-Authority Attribute Based Encryption," Proc. Fourth Conf. Theory of Cryptography (TCC), pp. 515-534, 2007.
  9. Sushmita Ruj, Member, Ieee, Milos Stojmenovic, Member, Ieee, And Amiya Nayak," Decentralized Access Control With Anonymous Authentication Of Data Stored In Clouds" Ieee Transactions On Parallel And Distributed Systems, Vol. 25, No. 2, February 2014.
  10. S. Jahid, P. Mittal, and N. Borisov, "EASiER: Encryption-Based Access Control in Social Networks with Efficient Revocation," Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Access control Authentication Attribute-based signatures Attribute-based