Impact Factor:6.549
 Scopus Suggested Journal: Tracking ID for this title suggestion is: 55EC484EE39417F0

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary




Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Anonymous Authentication of data storage in cloud computing administration with Decentralized Access

G.Gayathri Nikhila, A.Bhuvana Pramida, P.Jyothsna, K.Lavanya,
Affiliations
Department of CSE, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
:NOT ASSIGNED


Abstract
Cloud computing is a climbing processing standard in which stakes of the registering schema are given as an organization over the Web. As ensuring as it might be, this standard furthermore conveys quite a few people new difficulties for information security and access control when customers outsource touchy information for offering on cloud servers, which are not inside the same trusted domain as information owners. Regardless, in finishing hence, these results unavoidably display a considerable preparing overhead on the information owner for key dissemination and information organization when fine grained information access control is popular, and in this manner don't scale well. The issue of in the meantime achieving fine-graininess’, versatility, and information classifiedness of access control truly still stays questionable. This paper addresses this open issue by, on one hand, describing and actualizing access approaches focused around information qualities, and, of course, allowing the information manager to delegate most of the figuring endeavors included in fine-grained information access control to un-trusted cloud servers without disclosing the underlying information substance. We fulfill this objective by misusing and joining methods of decentralized key policy Attribute Based Encryption (KP-ABE). Far reaching examination demonstrates that the proposed methodology is exceptionally productive and secure.


Citation
G.Gayathri Nikhila,A.Bhuvana Pramida,P.Jyothsna,K.Lavanya."Anonymous Authentication of data storage in cloud computing administration with Decentralized Access". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.1, Issue 04,pp.195-198, OCTOBER - 2014, URL :https://ijcert.org/ems/ijcert_papers/V1I44.pdf,


Keywords : Access Control, Cloud Computing, Key Policy Attribute Based Encryption (KP-ABE)

References
[1] S Sushmita Ruj, Milos Stojmenovic and Amiya
Nayak,“Decentralized Access Control with
Anonymous Authentication of Data Stored in
Clouds”, IEEE TRANSACTIONS ON PARALLEL
AND CLOUD SYSTEMS
[2] Yang Tang, Patrick P.C. Lee, John C.S. Lui and
Radia Perlman,“Secure Overlay Cloud Storage with
Access Control and Assured Deletion”, IEEE
Transcations on dependable and secure computing,
VOL. 9, NO. 6, NOVEMBER/DECEMBER 2012
[3] G. Wang, Q. Liu, and J. Wu, “Hierarchical
attribute-based encryption for fine-grained access
control in cloud storage services,” in ACM CCS, , pp.
735–737, 2010
[4] Y. Tang, P.P.C. Lee, J.C.S. Lui, and R. Perlman,
“FADE: Secure Overlay Cloud Storage with File
Assured Deletion,” Proc. Sixth Int’l ICST
Conf.Security and Privacy in Comm. Networks
(SecureComm), 2010
[5] R. Perlman, “File System Design with Assured
Delete,” Proc. Network and Cloud System Security
Symp. ISOC (NDSS), 2007
[6] Ruj, A. Nayak, and I. Stojmenovic, “DACC: Cloud
access control in clouds,” in IEEE TrustCom, 2011
[7] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute
Based Data Sharing with Attribute Revocation,” Proc.
Fifth ACM Symp. Information, Computer and Comm.
Security (ASIACCS), Apr. 2010
[8] W. Wang, Z. Li, R. Owens, and B. Bhargava,
“Secure and Efficient Access to Outsourced Data,”
Proc. ACM Workshop Cloud Computing Security
(CCSW), Nov. 2009
[9] J. Bethencourt, A. Sahai, and B. Waters,
“Ciphertext-Policy Attribute-Based Encryption,” Proc.
IEEE Symp. Security and Privacy, May 2006
[10] R. Geambasu, J.P. John, S.D. Gribble, T. Kohno,
and H.M. Levy, “Keypad: Auditing File System for
Mobile Devices,” Proc. Sixth Conf. Computer Systems
(EuroSys), Apr. 2011


DOI Link : NOT ASSIGNED

Download :
  V1I44.pdf


Refbacks : Currently there are no Refbacks

Support Us


We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.

Quick Links



DOI:10.22362/ijcert


Science Central

Score: 13.30





Submit your paper to editorijcert@gmail.com