Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing

Authors

  • Arunachalam AR Assistant Professor, Department of Computer Science, Bharath univesity, Chennai
  • Kumar D Undergraduate Student Department of Computer Science, Bharath univesity, Chennai
  • Ranjan A Undergraduate Student Department of Computer Science, Bharath univesity, Chennai

Keywords:

Attribute based cryptography(ABE), reveal

Abstract

Cloud services give nice conveniences for the users to get pleasure from the on-demand cloud applications while not considering the native infrastructure limitations. Throughout the information accessing, completely different users is also in a very cooperative relationship, and so knowledge sharing becomes vital to attain productive edges. the prevailing security solutions principally concentrate on the authentication to understand that a user’s privative knowledge can\'t be unauthorized accessed, however neglect a delicate privacy issue throughout a user difficult the cloud server to request alternative users for knowledge sharing. The challenged access request itself could reveal the user’s privacy regardless of whether or not or not it will acquire the information access permissions. Many schemes using attribute-based cryptography (ABE) are projected for access management of outsourced knowledge in cloud computing.

References

H. Y. Lin and W. G. Tzeng, “A Secure Erasure Code-Based CloudStorage System with Secure Data Forwarding,” IEEE Transactions on

Parallel and Distributed Systems, vol. 23, no. 6, pp. 995-1003, 2012.

I. T. Lien, Y. H. Lin, J. R. Shieh, and J. L. Wu, “A Novel Privacy Preserving Location-Based Service Protocol with Secret Circular Shift for

K-nn Search,” IEEE Transactions on Information Forensics and Security, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&rnumber=6476

, 2013.

R. S´anchez, F. Almenares, P. Arias, D. D´ıazS´anchez, and A.Mar´ın, “Enhancing Privacy and Dynamic Federation in IdM foR Consumer Cloud Computing,” IEEE Transactions on ConsumerElectronics, vol. 58, no. 1, pp. 95-103, 2012.

Y. Tang, P. C. Lee, J. C. S. Lui, and R. Perlman, “Secure Overlay Cloud Storage with Access Control and Assured Deletion,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 903-916, 2012.

A. Mishra, R. Jain, and A. Durresi, “Cloud Computing: Networking and Communication Challenges,” IEEE Communications Magazine, vol. 50, no. 9, pp, 24-25, 2012.

J. Chen, Y. Wang, and X. Wang, “On-Demand Security Architecture for Cloud Computing,” Computer, vol. 45, no. 7, pp. 73-78,2012 .

H. Wang, “Proxy Provable Data Possession in Public Clouds,”IEEE Transactions on Services Computing, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6357181, 2012.

L. A. Dunning and R. Kresman, “Privacy Preserving Data Sharing With Anonymous ID Assignment,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 2, pp. 402-413, 2013.

Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems,vol. 22, no. 5, pp. 847-859, 2011.

Y. Zhu, H. Hu, G. Ahn, and M. Yu, “Cooperative Provable DataPossession for Integrity Verification in Multi-cloud Storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no, 12, pp. 2231-2244, 2012.

Downloads

Published

2024-02-26

How to Cite

Arunachalam, A., Kumar, D., & Ranjan, A. (2024). Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(04), 1602–1605. Retrieved from https://ijact.in/index.php/j/article/view/279

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.