CFP last date
20 January 2025
Reseach Article

A Secure Cloud Computing using Decentralized Access Control with Anonymous Authentication and User Revocation

Published on July 2016 by Priyanka D. Varma, Vaishali Maheshkar
International Conference on Internet of Things, Next Generation Networks and Cloud Computing
Foundation of Computer Science USA
ICINC2016 - Number 1
July 2016
Authors: Priyanka D. Varma, Vaishali Maheshkar
37854f4b-b570-4f4b-a5af-ac28fbd3f3cc

Priyanka D. Varma, Vaishali Maheshkar . A Secure Cloud Computing using Decentralized Access Control with Anonymous Authentication and User Revocation. International Conference on Internet of Things, Next Generation Networks and Cloud Computing. ICINC2016, 1 (July 2016), 1-5.

@article{
author = { Priyanka D. Varma, Vaishali Maheshkar },
title = { A Secure Cloud Computing using Decentralized Access Control with Anonymous Authentication and User Revocation },
journal = { International Conference on Internet of Things, Next Generation Networks and Cloud Computing },
issue_date = { July 2016 },
volume = { ICINC2016 },
number = { 1 },
month = { July },
year = { 2016 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/icinc2016/number1/25520-4732/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Internet of Things, Next Generation Networks and Cloud Computing
%A Priyanka D. Varma
%A Vaishali Maheshkar
%T A Secure Cloud Computing using Decentralized Access Control with Anonymous Authentication and User Revocation
%J International Conference on Internet of Things, Next Generation Networks and Cloud Computing
%@ 0975-8887
%V ICINC2016
%N 1
%P 1-5
%D 2016
%I International Journal of Computer Applications
Abstract

A Secure cloud computing is been proposed using access control which is attribute based encryption along with unspecified authentication of the user from security point of view and user revocation. In proposed system two key distribution centers are used and number of KDC can be increased depending on how many users are there. Decentralized approach is used in this paper as this approach proves to be successful from security as well as scalability point of view. Existing system use only one storage server in cloud which can fail in any random way which causes loss of data for this purpose in proposed system four servers are used in order to avoid such problems and keep backup of the data.

References
  1. S. Ruj, M. Stojmenovic and A. Nayak, "Decentralizedaccess Control authentication of data stored inClouds,"IEEE which isAnonymous transactions, vol 25, No. 2, Feb 2014.
  2. J. Li, O. Wang, C. Wang, N. cao, K. Ren, and W. Lou,"FuzzyKeyword Search over Data which is encrypted in Cloud Computing, "Proc. IEEE INFOCOM, pp. 441-445, 2010
  3. C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou, "Secure and Dependable Storage Services in Cloud Computing,"IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, April-June 2012.
  4. S. Kamara and K. Lauter,"Storage of Cryptographic Cloud,"Proc. 14th Int'l Conf. Financial Cryptography and Data Security, pp. 136-149, 2010.
  5. H. Li, Y. Dai, L. Tian, and H. Yang,"Identity-Based Authentication of Cloud Computing," Proc First Int'l Conf. Cloud Computing (CLoudCom), pp, 157-166, 2009
  6. C. Gentry,"Fully Homomorphic Encryption Scheme, "PhD Stanford Univ. ,http://www. crypto. stanford. edu/Craig,2009
  7. A. R. Sadeghi, T. Schneider, and M. Winandy,"Cloud Computing which is Token-Based, "Proc. Third Int'l Conf. Trust and Trustworthy Computing (TRUST), pp. 417-429, 2010
  8. H. K. Maji, M. Prabhakaran, and M. Rosulek, "Attribute-Based Signatures: Achieving Collusion Resistance and Attribute-Privacy,"IACR Cryptology ePrint Archive, 2008.
  9. F. Zhao, T. Nishide, and K. Sakurai,"Realizing Fine-Grained and Flexible Access Control for the OutsourcedData with attribute based cryptosystems,"Proc Seventh Int'lconf. information security practice and experience(ISPEC), pp. 83-97, 2011.
  10. D. R. Kuhn, E. J. Coyne, and T. R. Weil, "Adding theAttributes to Role-Based Access Control," IEEE Computer, vol. 43, no. 6, pp. 79-81, June 2010.
  11. M. Li, S. Yu,K. Ren, and W. Lou,"In Cloud Computing Securing Personal Health Records: Patient-Centric andFine-Grained Data Access Control in Multi Owner Settings," Proc. Sixth Int'l ICST Conf. Security and Privacy in Comm. Networks (SecureComm), pp. 89- 106, 2010.
  12. S. Yu, C. Wang, K. Ren, and W. Lou, "The Attribute Based Data Sharing with Attribute Revocation," Proc. ACM Symp InformationComputer and Comm. Security (ASIACCS), pp. 261-270, 2010.
  13. G. Wang, Q. Liu, and J. Wu, "Hierarchical AttributeWhich is based on Encryption for the Fine-Grained Access Control in CloudnStorage Services,"Proc. 17th ACM Conf. Computer and Comm. Security (CCS), pp. 735-737, 2010.
  14. F. Zhao, T. Nishide, and K. Sakurai, "Realizing Fine-Grained and Flexible Access Control to the Data which is outsourced withAttribute-Based Cryptosystems," Proc. Seventh Int'l Conf. Information Security Practice and Experience (ISPEC), pp. 83-97, 2011
Index Terms

Computer Science
Information Sciences

Keywords

Access Control Unspecified Authentication User Revocation Key Encryption Backup Storage Servers