CFP last date
20 January 2025
Reseach Article

Review on Fuzzy Authorization for Cloud Storage

by Arya Vijayan, Devi Dath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 131 - Number 15
Year of Publication: 2015
Authors: Arya Vijayan, Devi Dath
10.5120/ijca2015907648

Arya Vijayan, Devi Dath . Review on Fuzzy Authorization for Cloud Storage. International Journal of Computer Applications. 131, 15 ( December 2015), 1-3. DOI=10.5120/ijca2015907648

@article{ 10.5120/ijca2015907648,
author = { Arya Vijayan, Devi Dath },
title = { Review on Fuzzy Authorization for Cloud Storage },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 131 },
number = { 15 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume131/number15/23522-2015907648/ },
doi = { 10.5120/ijca2015907648 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:27:26.283661+05:30
%A Arya Vijayan
%A Devi Dath
%T Review on Fuzzy Authorization for Cloud Storage
%J International Journal of Computer Applications
%@ 0975-8887
%V 131
%N 15
%P 1-3
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a widely accepted technology that delivers many services over internet. The services includes storage, easy access from anywhere at any time and also minimum device memory utility. Inorder to provide security and privacy of data many authorization schemes are used. OAuth scheme is one of the most commonly used authorization scheme. But it cannot be used in the case of heterogeneous clouds. To overcome this difficulty, Fuzzy Authorization scheme was proposed. In this scheme, modified Ciphertext Policy-Attribute Based Encryption (CP-ABE) and OAuth schemes are used. This scheme provides the facility for an application that is present in one cloud party to access data that is stored in another cloud party. Fuzzy Authorization is a reading authorization scheme and data modification can only be done by data owner. When a data is modified, the application’s right of accessing the data will be automatically canceled. By making use of Linear Secret Sharing Scheme and GRS code this scheme has become more scalable and flexible. The implementation is done by using simulator OMNET++4.2.2 and cryptographic part is done by using Pairing Based Cryptographic(PBC)library. Simulation results shows that this scheme is more secure and efficient. Different access control schemes are compared in this paper based on many parameters.

References
  1. http://www.thetop10bestonlinebackup.com/cloud-storage.
  2. Shasha Zhu and Guang Gong, ”Fuzzy Authorization for Cloud Storage”.
  3. http://www.pdfmerge.com/
  4. ”Google accounts authentication and authorization,” https://developers.google.com/ accounts/ docs/OAuth2Login/registeringyourapp, April 2013.
  5. A.Tassanaviboon and G.Gong,”OAuth and ABE based authorization in semi-trusted cloud computing” in Data intensive computing in clouds-DataCloud-SC’11 , second international workshop , proceedings. ACM, 2011, pp.41-50.
  6. E.Hammer-Lahav, D.Recordon, D.Hardt, ” The OAuth 2.0 authorization protocol”. Available at http://tools.ietf.org/html/rfc6749
  7. W.Wang, Z. Li, R. Owens, and B. Bhargava, ”Secure and efficient access to outsourced data,” in Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009, pp. 55-65
  8. J.Bethencourt, A.Sahai and B.Waters, ”Ciphertext Policy Attribute Based Encryption” in In proceedings of IEEE Symposium on Security and Privacy” IEEE 2007, pp.321-334.
  9. A. O. Michael Backes, Christian Cachin, ”Secure keyupdating for lazy revocation,” in Computer Security ESORICS 2006, ser. Lecture Notes in Computer Science, vol.4189. Springer Berlin Heidelberg, 2006, pp. 41-50.
  10. R.McEliece and D.Sarwatie, ”On sharing secrets and reedsolomon codes” , ACM vol 24,no.9,pp.583-584.
  11. V.Goyal, O.Pandey,A.Sahai and B.Waters, ”Attribute-based encryption for fine grained access control” in Proc.13,ACM conf.comput.commun.security,2006,pp.89-98.
  12. S.Yu, ”Data sharing on untrusted storage with attribute based encryption”.Ph.D. dissertation, Worcester Polytechnic Institute, MA, USA, July 2010.
  13. B. Lynn, ”On the implementation of pairing-based cryptosystems,” Ph.D. dissertation, Stanford University, CA, USA, June 2007.
  14. B. Lynn, PBC Library Manual, http://crypto.stanford.edu/pbc/manual.pdf
  15. A. Shamir, ”How to share a secret,” Communications of the ACM, vol. 22, pp. 612-613, 1979. data access control in cloud computing” in INFOCOM’10 Proceedings of the 29th conference on Information communications. IEEE, 2010, pp. 534- 542.
Index Terms

Computer Science
Information Sciences

Keywords

Ciphertext Policy-Attribute based Encryption Fuzzy Authorization Cloud Storage Provider Application Service Provider