Affiliations M.Tech (CSE), Priyadarshini Institute of Technology & ManagementProfessor ( Dept.of CSE), Priyadarshini Institute of Technology & Management
A new suburbanised access management theme for secure information storage in clouds that support
anonymous authentication. Throughout this theme, the cloud verifies the credibility of the user whereas not knowing the
user’s identity before storing information and in addition has added the feature of access management throughout that
entirely valid user’s square measure able to rewrite the hold on knowledge. The theme prevents reply attack and
supports creation, modification, and reading the data hold on inside the cloud user and in addition have the address user
revocation. Moreover, our authentication and access management theme is suburbanised and durable, in distinction to
different access management schemes designed for clouds that square measure centralized. The communication,
computation, and storage overheads square measure resembling centralized approaches. If the user does not have
credentials to urge the key and incorrectly coming back into key to access the file implies that persona non grata
identification activates the system to transfer a faux file to the persona non grata and inform to the administrator of the
system thus the land in addition the} user United Nations agency created that file is attempt to access and conjointly hide
the attribute and access policy of a user.
ASHOK NAGASAI MANCHALLA,D.RAVIKIRAN."Revocable Data Access Control in Public Cloud". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 11,pp.820-825, November- 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I1124.pdf,
Keywords : Trespasser identification, attribute based encryption, attribute based signature
 S. Ruj, Member, IEEE, M. Stojmenovic, Member, IEEE, and A.Nayak, Senior Member, IEEE"Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds",Feb-2014,pp.384-394
 S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving AccessControl with Authentication for Securing Data in Clouds,” Proc. IEEE/ACM Int’l Symp.Cluster, Cloud and Grid Computing, pp.556- 563, 2012.
 C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secureand Dependable Storage Services in Cloud Computing,” IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.- June2012.
 J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “FuzzyKeyword Search Over Encrypted Data in Cloud Computing,” Proc. IEEE INFOCOM, pp. 441-445, 2010.
 S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc.14th Int’l Conf. Financial Cryptography and Data Security, pp. 136-149, 2010.
 H. Li, Y. Dai, L. Tian, and H. Yang, “IdentityBasedAuthentication for Cloud Computing,” Proc. First Int’l Conf. Cloud Computing (CloudCom), pp. 157-166, 2009.
 C. Gentry, “A Fully Homomorphic Encryption Scheme,” PhDdissertation, Stanford Univ., http://www.crypto.stanford.edu/craig,2009.
 R.K.L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M.Kirchberg, Q. Liang, and B.S. Lee, “Trustcloud: A Framework for Accountability and Trust in Cloud Computing, ”HP TechnicalReport HPL- 2011- 38,http://www.hpl.hp.com/techreports/2011/HPL2011-38.html, 2013.
 R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: TheEssential of Bread and Butter of Data Forensics in Cloud Computing,” Proc. Fifth ACM Symp.Information, Computer andComm. Security (ASIACCS), pp. 282- 292, 2010.
 D.F. Ferraiolo and D.R. Kuhn, “Role-Based Access Controls,” Proc.15th Nat’l Computer Security Conf.,