Privacy Preserving with Anonymous Authentication using Decentralized Access Control
M.Rajesh, Dr G Rama swamy, , ,
Affiliations M.Tech (CSE), Priyadarshini Institute of Technology & Science Professor (Dept.of CSE), Priyadarshini Institute of Technology & Science
— the spearheading decentralized access control plan for vulnerable data storage in Cloud that backings unidentified confirmation. In the proposed plan, the Cloud checks the validness of the server without knowing the client's
uniqueness before putting away data. The proposed outline concentrates on the full cycle access controlling plan wherein
the displayed framework it was overlooked. Keeping in mind the end goal to accomplish secure access controlling plan we
proposed fine-grained approach at cloud level, it keeps unapproved access controlling from clients or foes adequately our
validation and access control plan is decentralized and solid, not at all like different access control plans intended for
Cloud which are unified. The correspondence, calculation overheads are like unified methodologies. In addition, our proposed plan demonstrates that our framework has secure crypto instrument towards accomplishing data integrity and security.
M.Rajesh,Dr G Rama swamy."Privacy Preserving with Anonymous Authentication using Decentralized Access Control". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 12,pp.1178-1181, December- 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I1266.pdf,
 S Sushmita Ruj, Milos Stojmenovic and Amiya Nayak, ―Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds‖, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
 C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, ―Toward Secure and Dependable Storage Services in Cloud Computing,‖ IEEE Trans. Services Computing, Apr.- June 2012.
 H. Li, Y. Dai, L. Tian, and H. Yang, ―IdentityBased Authentication for Cloud Computing,‖ Proc. First Int’l Conf. Cloud Computing, 2009.
 C. Gentry, ―A Fully Homomorphic Encryption Scheme,‖ PhD dissertation, Stanford Univ., 2009.
 A.-R. Sadeghi, T. Schneider, and M. Winandy, ―Token-Based Cloud Computing,‖ Proc. Third Int’l Conf. Trust and Trustworthy Computing (TRUST), 2010.
 M. Li, S. Yu, K. Ren, and W. Lou, ―Securing Personal Health Records in Cloud Computing: PatientCentric and Fine-Grained Data Access Control in Multi-Owner Settings,‖ Proc. Sixth Int’l ICST Conf. Security and Privacy in Comm. Networks (SecureComm), 2010.
 S. Yu, C. Wang, K. Ren, and W. Lou, ―Attribute Based Data Sharing with Attribute Revocation,‖ Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), 2010.
 G. Wang, Q. Liu, and J. Wu, ―Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services,‖ Proc. 17th ACM Conf. Computer and Comm. Security (CCS), 2010.
 F. Zhao, T. Nishide, and K. Sakurai, ―Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems,‖ Proc. Seventh Int’l Conf. Information Security Practice and Experience (ISPEC), 2011.
 S. Ruj, A. Nayak, and I. Stojmenovic, ―DACC: Distributed Access Control in Clouds,‖ Proc. IEEE 10th Int’l Conf. Trust, Security and Privacy in Computing and Communications (TrustCom), 2011.
 S.SeenuIropia, R.Vijayalakshmi, ―Decentralized Access Control Of Data Stored In Clouds Using Key Policy Attribute Based Encryption‖, International Journal Of Invention In Computer Science And Engineering, 2014.
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.