CFP last date
20 January 2025
Reseach Article

Security Provision for Data Stored in Cloud using Decentralized Access Control with Anonymous Authentication

by Afsha Pathan, M. D. Ingle
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 146 - Number 12
Year of Publication: 2016
Authors: Afsha Pathan, M. D. Ingle
10.5120/ijca2016910931

Afsha Pathan, M. D. Ingle . Security Provision for Data Stored in Cloud using Decentralized Access Control with Anonymous Authentication. International Journal of Computer Applications. 146, 12 ( Jul 2016), 18-22. DOI=10.5120/ijca2016910931

@article{ 10.5120/ijca2016910931,
author = { Afsha Pathan, M. D. Ingle },
title = { Security Provision for Data Stored in Cloud using Decentralized Access Control with Anonymous Authentication },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 146 },
number = { 12 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 18-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume146/number12/25450-2016910931/ },
doi = { 10.5120/ijca2016910931 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:50:15.234000+05:30
%A Afsha Pathan
%A M. D. Ingle
%T Security Provision for Data Stored in Cloud using Decentralized Access Control with Anonymous Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 146
%N 12
%P 18-22
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As we store more sensitive data on cloud and also share it with third party. Though cloud storage provides on-demand services to multiple users but there are several issues related security. So in this paper we are trying to address security related issues of cloud, so that users can store any confidential data on cloud without any fear and enjoy the services provided by cloud. In this paper we have proposed a new decentralized access control mechanism to secure data stored on cloud. This proposed scheme will support anonymous authentication scheme. In that system will initially verifies the identity of the user .Here Authentication and access control schemes are decentralized unlike other systems which are centralized. Also here we are storing access policies on cloud in hash codes so that we can hide it from third parties. The proposed scheme also addresses the problem of replay attack and user revocation. So the proposed scheme is more robust than the existing scheme as it doesn’t store the authentication information on cloud itself.

References
  1. Sushmita Ruj, Milos Stojmenovic, and Amiya Nayak,” Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014
  2. R.K.L. Ko, P. Jagad pramana, M. Mowbray, S. Pearson, M.Kirchberg, Q. Liang, and B.S. Lee, “Trustcloud: A Framework for Accountability and Trust in Cloud Computing,” HP Technical Report HPL-2011 38, http://www.hpl.hp.com/techreports/2011/HPL-2011-38.html, 2013.
  3. D.F. Ferraiolo and D.R. Kuhn, “Role-Based Access Controls,”Proc.15th Nat’l Computer Security Conf., 1992.
  4. M. Li, S. Yu, K. Ren, and W. Lou, “Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings,” Proc. Sixth Int’lICST Conf. Security and Privacy in Comm. Networks (SecureComm),pp. 89-106, 2010.
  5. D.R. Kuhn, E.J. Coyne, and T.R. Weil, “Adding Attributes to Role-Based Access Control,” IEEE Computer, vol. 43, no. 6, pp. 79-81,June 2010.
  6. http://securesoftwaredev.com/2012/08/20/xacmlin-the-cloud,2013.
  7. W. Wang, Z. Li, R. Owens, and B. Bhargava,“Secure and Efficient Access to Outsourced Data,”Proc. ACM Cloud Computing Security Workshop(CCSW), 2009.
  8. S. Ruj, A. Nayak, and I. Stojmenovic, “DACC:Distributed AccessControl in Clouds,” Proc. IEEE 10th Int’l Conf. Trust, Security andPrivacy in Computing and Communications (TrustCom), 2011.
  9. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-PolicyAttribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy, pp. 321-334,2007.
  10. M. Chase, “Multi-Authority Attribute Based Encryption,” Proc. Fourth Conf. Theory of Cryptography (TCC), pp. 515-534, 2007.
  11. C. Wang, Q. Wang, K. Ren, N. Cao, and W.Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,”IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.-June2012.
  12. A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” Proc. Ann. Int’l Conf. Advances in Cryptology (EUROCRYPT), pp. 457-473, 2005.
  13. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. ACM Conf. Computer and Comm. Security, pp. 89-98, 2006
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Privacy Preservation Access control Anonymous Authentication Decentralized