CFP last date
20 December 2024
Reseach Article

Privacy - Preserving Public Authentication for Shared Data in Cloud

by Priyanka R Chaudhari, Archana C. Lomte
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 21
Year of Publication: 2015
Authors: Priyanka R Chaudhari, Archana C. Lomte
10.5120/21826-5078

Priyanka R Chaudhari, Archana C. Lomte . Privacy - Preserving Public Authentication for Shared Data in Cloud. International Journal of Computer Applications. 121, 21 ( July 2015), 32-37. DOI=10.5120/21826-5078

@article{ 10.5120/21826-5078,
author = { Priyanka R Chaudhari, Archana C. Lomte },
title = { Privacy - Preserving Public Authentication for Shared Data in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 21 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 32-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number21/21826-5078/ },
doi = { 10.5120/21826-5078 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:09:03.835726+05:30
%A Priyanka R Chaudhari
%A Archana C. Lomte
%T Privacy - Preserving Public Authentication for Shared Data in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 21
%P 32-37
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data security is an important in cloud. Access control is major issue to secure the stored data in cloud. Thus the proposing privacy preserving authenticated access control scheme for securing shared data in cloud. In the proposed scheme supports authenticated access control for anonymous user to share data on cloud also additional feature in access control which provides authentication for the user, in which only valid users are able to decrypt the stored information. User authentication and access control scheme are introduced in decentralized, which prevent replay attacks and also supports to creation, , and reading, modification data stored in the cloud. Implementation also provide feature user revocation.

References
  1. Sushmita Ruj, Milos Stojmenovic and Amiya Nayak ,"Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds", IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 2, February 2014.
  2. S. Ruj, M. Stojmenovic, and A. Nayak, "Privacy Preserving AccessControl with Authentication for Securing Data in Clouds", Proc. IEEE/ACM Intl Symp. Cluster, Cloud and Grid Computing, pp. 556-563, 2012.
  3. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou,"TowardSecure and Dependable Storage Services in Cloud Computing," IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr. -June 2012.
  4. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "FuzzyKeyword Search Over Encrypted Data in Cloud Computing," Proc. IEEE INFOCOM, pp. 441-445, 2010.
  5. S. Kamara and K. Lauter, "Cryptographic Cloud Storage," Proc. 14th Intl Conf. Financial Cryptography and Data Security, pp. 136-149, 2010.
  6. H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-Based Authentication for Cloud Com-puting," Proc. First Intl Conf. Cloud omputing(CloudCom), pp. 157-166, 2009.
  7. C. Gentry, "A Fully Homomorphic Encryption Scheme," PhD dissertation, Stanford Univ. , http://www. crypto. stanford. edu/craig, 2009.
  8. A. -R. Sadeghi, T. Schneider, and M. Winandy, "Token-BasedCloud Computing," Proc. Third Intl Conf. Trust and TrustworthyComputing (TRUST), pp. 417-429, 2010.
  9. R. K. L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg,Q. Liang, and B. S. Lee, "Trustcloud: A Frameworkfor Accountability and Trust in Cloud Computing," HP TechnicalReport HPL-2011-38, http://www. hpl. hp. com/techreports/2011/HPL-2011-38. html, 2013.
  10. R. Lu, X. Lin, X. Liang, and X. Shen, "Secure Provenance: The Essential of Bread and Butter of Data Forensics in CloudComputing," Proc. Fifth ACM Symp. Information, Computer andComm. Security (ASIACCS), pp. 282-292, 2010.
  11. W. Wang, Z. Li, R. Owens, and B. Bhargava, "Secure and e_cient access to outsourced data,," in ACM Cloud Computing Security Workshop (CCSW), 2009.
  12. S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in ACM ASIACCS, pp. 261270, 2010.
  13. D. F. Ferraiolo and D. R. Kuhn, "Role-Based Access Controls," Proc. 15th Natl Computer Security Conf. , 1992.
  14. D. R. Kuhn, E. J. Coyne, and T. R. Weil, "Adding Attributes to Role-Based AccessControl," IEEE Computer, vol. 43, no. 6, pp. 79-81,June 2010.
  15. M. Li, S. Yu, K. Ren, and W. Lou, "Securing personal health records in cloud computing: Patient-centric and _ne-grained data access control in multiowner settings,"in Secure Comm, pp. 89106, 2010.
  16. A. B. Lewko and B. Waters, "Decentralizing attribute-based encryption," in EUROCRYPT, ser. Lecture Notes in Computer Science, vol. 6632. Springer, pp. 568588, 2011.
  17. F. Zhao, T. Nishide, and K. Sakurai, "Realizing _ne-grained and flexible access control to outsourced data with attribute-based cryptosystems," in ISPEC, ser. Lecture Notes in Computer Science, vol. 6672. Springer, pp. 8397, 2011.
  18. Kan Yang, Xiaohua Jia and Kui Ren, "DAC-MACS: E_ective Data Access Control for Multi-Authority Cloud Storage Systems," IACR Cryptology ePrint Archive, 419, 2012.
  19. S. Ruj, A. Nayak, and I. Stojmenovic, "DACC: Distributed access control in clouds," in IEEE TrustCom, 2011.
  20. M. Chase, "Multi-authority attribute based ncryption,"inTCC,ser. Lecture Notes in Computer Science, vol. 4392. Springer, pp. 515534, 2007
  21. G. Wang, Q. Liu, and J. Wu,"Hierarchical attribute-based encryption for fine grained access control in cloud storage services," in ACM CCS, , pp. 735737, 2010.
  22. https://en. wikipedia. org/wiki/RSA_%28cryptosystem%29
  23. Priyanka R. Chaudhari and Prof. Archana C. Lomte "Secure Access Control on Shared Data In Cloud", International Journal of Engineering Technology and Computer Research (IJETCR)Volume 2; Issue 6; Page No. 148-153.
Index Terms

Computer Science
Information Sciences

Keywords

Access control Authentication key distribution centers (KDCs).