Incognito-authentication for preserving information on cloud with distributed approach control
DOI:
https://doi.org/10.14419/ijet.v7i2.21.12379Published:
2018-04-20Keywords:
Cloud computing, Incognito, approaches control, verification, visualizations.Abstract
A new distributed approach control methods which are considered on preserve information repository in clouds in order to back incognito authentication. In the current method, the cloud checks the credibility of the series by not getting the user’s integrity formerly saving the information. In this work we developed a method which include major aspects like approach control for all authentic users who can able to decode the preserved knowledge. This method blocks epitomize barrage along with backing formation, alteration as well as educating information reposted in the cloud. We moreover deal customer repudiation, verification and approach control methods are distributed and vigorous, unlike alternative approach control methods created for clouds which are unify. The conversation, calculation along with repository aloft which is as good as to unify access.
References
[1] Ruj S, Stojmenovic M & Nayak A, “Privacy Preserving Access Control with Authentication for Securing Data in Cloudsâ€, Proc. IEEE/ACM Int’l Symp. Cluster, Cloud and Grid Computing, (2012), pp.556-563.
[2] Wang C, Wang Q, Ren K, Cao N & Lou W, “Toward Secure and Dependable Storage Services in Cloud Computingâ€, IEEE Trans. Services Computing, Vol.5, No.2, (2012), pp.220-232.
[3] Li J, Wang Q, Wang C, Cao N, Ren K & Lou W, “Fuzzy Keyword Search Over Encrypted Data in Cloud Computingâ€, Proc. IEEE INFOCOM, (2010), pp.441-445.
[4] Kamara S & Lauter K, “Cryptographic Cloud Storageâ€, Proc. 14th Int’l Conf. Financial Cryptography and Data Security, (2010), pp.136-149.
[5] Li H, Dai Y, Tian L & Yang H, “Identity-Based Authentication for Cloud Computingâ€, Proc. First Int’l Conf. Cloud Computing (CloudCom), (2009), pp. 157-166.
[6] Sadeghi AR, Schneider T & Winandy M, “Token-Based Cloud Computingâ€, Proc. Third Int’l Conf. Trust and Trustworthy Computing (TRUST), (2010), pp.417-429.
[7] Lu R, Lin X, Liang X & Shen X, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computingâ€, Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS), (2010), pp.282-292.
[8] Kuhn DR, Coyne EJ & Weil TR, “Adding Attributes to Role-Based Access Controlâ€, IEEE Computer, Vol.43, No.6, (2010), pp.79-81.
[9] Li M, Yu S, Ren K & Lou W, “Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settingsâ€, Proc. Sixth Int’l ICST Conf. Security and Privacy in Comm. Networks (SecureComm), (2010), pp.89-106.
[10] Yu S, Wang C, Ren K & Lou W, “Attribute Based Data Sharing with Attribute Revocation,†Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 261-270, 2010.
[11] Wang G, Liu Q & Wu J, “Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Servicesâ€, Proc. 17th ACM Conf. Computer and Comm. Security, (2010), pp.735-737.
[12] Zhao F, Nishide T & Sakurai K, “Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystemsâ€, Proc. Seventh Int’l Conf. Information Security Practice and Experience (ISPEC), (2011), pp.83-97.
[13] Jahid S, Mittal P & Borisov N, “EASiER: Encryption-Based Access Control in Social Networks with Efficient Revocationâ€, Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), (2011).
[14] Rivest RL, Shamir A & Tauman Y, “How to Leak a Secretâ€, Proc. Seventh Int’l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT), (2001), pp.552-565.
[15] Boyen X, “Mesh Signaturesâ€, Proc. 26th Ann. Int’l Conf. Advances in Cryptology (EUROCRYPT), (2007), pp.210-227.
[16] Maji HK, Prabhakaran M & Rosulek M, “Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistanceâ€, IACR Cryptology ePrint Archive, (2008).
[17] Maji HK, Prabhakaran M & Rosulek M, “Attribute-Based Signaturesâ€, Topics in Cryptology-CT-RSA, Vol.6558, (2011), pp.376-392.
[18] Beimel A, “Secure Schemes for Secret Sharing and Key Distributionâ€, PhD thesis, Technion, Haifa, (1996).
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2018-05-03
Published 2018-04-20