Manuscript Number : CSEIT1723308
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and Anonymity
Authors(2) :-Chanda Gurnule, Prof. Bhagyashree Madan
Cloud computing is a processing ideas, which empowers when required and low support use of assets, yet the information is offers to some cloud servers and different security related concerns rise up out of it. Different plans like based on the attribute-based encryption have been produced to secure the distributed storage. Most work taking a gander at the information protection and the access control, while less consideration is given to the benefit control and the security. In this paper, we display a benefit control plot Anonymity Control to address and the client character protection in existing access control. Anonymity Control decentralizes the focal authority to constrain the character spillage and subsequently accomplishes incomplete anonymity. It additionally produces the file access control to the benefit control, by which benefits of all operations on the cloud information can be overseen in an appropriate way. We exhibit the Anonymity Control-F, which keeps the personality and accomplish the anonymity. Our security examination demonstrates that both Anonymity Control and Anonymity Control-F are secure under the Diffie–Hellman supposition and our performance assessment shows the feasibility of our plans.
Department of Computer Science and Engineering, W.C.E.M, Nagpur, Maharashtra, India
Prof. Bhagyashree Madan
Assistant Professor, Department of Computer Science and Engineering, W.C.E.M, Nagpur, Maharashtra, India
Anonymity, Multi-Authority, Attribute-Based Encryption
- A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1985, pp. 47 -53.
- A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 457 -473.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. 13th CCS, 2006, pp. 89 -98.
- J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased encryption,” in Proc. IEEE SP, May 2007, pp. 321 -334.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryp-tion for fine-grained access control of encrypted data,” in CCS. ACM, 2006, pp. 89 -98.
- J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in S&P. IEEE, 2007, pp. 321 -334.
- M. Chase, “Multi-authority attribute based encryption,” in TCC. Springer, 2007, pp. 515 -534.
- M. Chase and S. S. Chow, “Improving privacy and security in multi-authority attribute-based encryption,” in CCS. ACM, 2009, pp. 121 - 130.
- H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,” Information Sciences, vol. 180, no. 13, pp. 2618 -2632, 2010.
- V. Bozovi'c, D. Socek, R. Steinwandt, and V. I. Villanyi, “Multi-authority attribute-based encryption with honest-but-curious central authority,” IJCM, vol. 89, no. 3, pp. 268 -283, 2012.
- F. Li, Y. Rahulamathavan, M. Rajarajan, and R.-W. Phan, “Low com-plexity multi-authority attribute based encryption scheme for mobile cloud computing,” in SOSE. IEEE, 2013, pp. 573 -577.
- K. Yang, X. Jia, K. Ren, and B. Zhang, “Dac-macs: Effective data access control for multi-authority cloud storage systems,” in INFOCOM. IEEE, 2013, pp. 2895 -2903.
Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-31
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 94-99
Manuscript Number : CSEIT1723308
Publisher : Technoscience Academy
URL : http://ijsrcseit.com/CSEIT1723308