Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
Keywords:
Attribute based cryptography(ABE), revealAbstract
Cloud services give nice conveniences for the users to get pleasure from the on-demand cloud applications while not considering the native infrastructure limitations. Throughout the information accessing, completely different users is also in a very cooperative relationship, and so knowledge sharing becomes vital to attain productive edges. the prevailing security solutions principally concentrate on the authentication to understand that a user’s privative knowledge can\'t be unauthorized accessed, however neglect a delicate privacy issue throughout a user difficult the cloud server to request alternative users for knowledge sharing. The challenged access request itself could reveal the user’s privacy regardless of whether or not or not it will acquire the information access permissions. Many schemes using attribute-based cryptography (ABE) are projected for access management of outsourced knowledge in cloud computing.
References
H. Y. Lin and W. G. Tzeng, “A Secure Erasure Code-Based CloudStorage System with Secure Data Forwarding,” IEEE Transactions on
Parallel and Distributed Systems, vol. 23, no. 6, pp. 995-1003, 2012.
I. T. Lien, Y. H. Lin, J. R. Shieh, and J. L. Wu, “A Novel Privacy Preserving Location-Based Service Protocol with Secret Circular Shift for
K-nn Search,” IEEE Transactions on Information Forensics and Security, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&rnumber=6476
, 2013.
R. S´anchez, F. Almenares, P. Arias, D. D´ıazS´anchez, and A.Mar´ın, “Enhancing Privacy and Dynamic Federation in IdM foR Consumer Cloud Computing,” IEEE Transactions on ConsumerElectronics, vol. 58, no. 1, pp. 95-103, 2012.
Y. Tang, P. C. Lee, J. C. S. Lui, and R. Perlman, “Secure Overlay Cloud Storage with Access Control and Assured Deletion,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 903-916, 2012.
A. Mishra, R. Jain, and A. Durresi, “Cloud Computing: Networking and Communication Challenges,” IEEE Communications Magazine, vol. 50, no. 9, pp, 24-25, 2012.
J. Chen, Y. Wang, and X. Wang, “On-Demand Security Architecture for Cloud Computing,” Computer, vol. 45, no. 7, pp. 73-78,2012 .
H. Wang, “Proxy Provable Data Possession in Public Clouds,”IEEE Transactions on Services Computing, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6357181, 2012.
L. A. Dunning and R. Kresman, “Privacy Preserving Data Sharing With Anonymous ID Assignment,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 2, pp. 402-413, 2013.
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems,vol. 22, no. 5, pp. 847-859, 2011.
Y. Zhu, H. Hu, G. Ahn, and M. Yu, “Cooperative Provable DataPossession for Integrity Verification in Multi-cloud Storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no, 12, pp. 2231-2244, 2012.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.