CFP last date
20 December 2024
Reseach Article

An Analysis of Access Control Mechanism with Authentication of Anonymous user and Deduplication of Data in Decentralized Clouds

by Imran D. Tamboli, Ranjana R. Badre
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 159 - Number 3
Year of Publication: 2017
Authors: Imran D. Tamboli, Ranjana R. Badre
10.5120/ijca2017912884

Imran D. Tamboli, Ranjana R. Badre . An Analysis of Access Control Mechanism with Authentication of Anonymous user and Deduplication of Data in Decentralized Clouds. International Journal of Computer Applications. 159, 3 ( Feb 2017), 12-18. DOI=10.5120/ijca2017912884

@article{ 10.5120/ijca2017912884,
author = { Imran D. Tamboli, Ranjana R. Badre },
title = { An Analysis of Access Control Mechanism with Authentication of Anonymous user and Deduplication of Data in Decentralized Clouds },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2017 },
volume = { 159 },
number = { 3 },
month = { Feb },
year = { 2017 },
issn = { 0975-8887 },
pages = { 12-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume159/number3/26980-2017912884/ },
doi = { 10.5120/ijca2017912884 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:04:44.370423+05:30
%A Imran D. Tamboli
%A Ranjana R. Badre
%T An Analysis of Access Control Mechanism with Authentication of Anonymous user and Deduplication of Data in Decentralized Clouds
%J International Journal of Computer Applications
%@ 0975-8887
%V 159
%N 3
%P 12-18
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The internet framework and thousands of users are dealing with cloud for sensitive information over cloud computing nowadays providing exciting features due to the services .In terms of security and the access control mechanisms cloud server management is challenging task due to sensitivity of data deploy in clouds. For the Key Distribution and also data administration when a course of fine grained access control on data is demanded by the users and the scaling factor must be well enough the cloud server suffers with the processing overhead. To maintain scalability, data confidentiality as well as fine graininess of access control mechanisms at the same time on the risk of uncertainty is the main issues. As based on quality of data the system provides and generates access policies and then afterward gives severs by maintaining the security and encryption of data the permission of data owner and modifier to unauthorized cloud severs by maintaining the security and encryption of data. By taking combination of decentralized key policy and attribute Based Encryption (KP-ABE) this thing can be overcome. The proposed system will be robust and secure. The technique referred is known as Deduplication of data (removal of repeated copies), also removal of copies of continuously repeating data is necessary, one of the most important data compression technique widely used in cloud storage to recover the space and bandwidth of cloud. A big support is provided by using convergent encryption technique to the protection of the confidentiality of sensitive data by performing authorized duplicate check in hybrid cloud storage architectures.

References
  1. SushmitaRuj, Milos Stojmenovic, and AmiyaNayak, “Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL.
  2. H.K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance,” IACR Cryptology ePrint Archive, 2008.
  3. M. Green, S. Hohenberger, and B. Waters, “Outsourcing the Decryption of ABECiphertexts,” Proc. USENIX Security Symp., 2011.
  4. H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-based authentication for cloud computing,” in CloudCom, ser. Lecture Notes in Computer Science, vol.5931. Springer, pp. 157–166, 2009.
  5. S. Ruj, M. Stojmenovic and A. Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds”, IEEE/ACM International Symposium on Cluster,Cloud and Grid Computing, pp. 556–563, 2012.
  6. Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, WenjingLou,“A Hybrid Cloud Approach for Secure Authorized Deduplication”,IEEE Transactions on Parallel and Distributed Systems, 2014.
  7. “Libfenc: The Functional Encryption Library,”http://code.\google.com/p/libfenc/, 2013.
  8. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.-June 2012.
  9. http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf, 2013.
  10. http://securesoftwaredev.com/2012/08/20/xacml-in-the-cloud,2013.
  11. K. Yang, X. Jia, and K. Ren, “DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems,” IACR Cryptology ePrint Archive, p. 419, 2012.
  12. A.B. Lewko and B. Waters, “Decentralizing Attribute-Based Encryption”, Proc. Ann. Int’l Conf. Advances in Cryptology(EUROCRYPT), pp. 568-588, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Storage Access control Key Distribution Centre Data Deduplication KP-ABE.