Achieving Scalability with Data Owner Anonymity in Cloud Access Control

Journal Title: Transactions on Networks and Communications - Year 2017, Vol 5, Issue 2

Abstract

Cloud computing is a trending technology that enables subscribing organizations to outsource computations and storage, and eliminates the need of purchasing and maintaining the equipment by the organizations themselves. However, it is very challenging to maintain the privacy and security of data especially when the number of users grows dramatically. This paper focuses on achieving a high level of scalability to the cloud, allowing fine-grained access control, preserving the anonymity of the data owner and enabling the end user to verify the integrity of the data uploaded to the cloud. In order to achieve this, this paper proposes an effective scheme that uses Ciphertext Policy Attribute Based Encryption (CPABE) combined with identity-based encryption (IBE), and introduces a security mediator which signs files on behalf of the data owner to preserve the data owner’s anonymity from the cloud. This scheme allows the end user to check the integrity of the data on the cloud.

Authors and Affiliations

Abdulqader A. Bahaj, Ahmed M. Abouollo

Keywords

Related Articles

Toward 1.8 Tb/s CAP Schemes for Short Reach Optical Communication Systems

Wavelength-division multiplexed (WDM)carrierless amplitude/phase (CAP) modulation is proposed for1.8 Tb/sfor short reach optical communication system. The system uses 16 channels, each operates at 112 Gb/s. A single-band...

Searching Isomorphic Graphs

To determine that two given undirected graphs are isomorphic, we construct for them auxiliary graphs, using the breadth-first search. This makes capability to position vertices in each digraph with respect to each other....

Optimal Routing Algorithm in Multilayer Octagon-Cell: A New Class of Octagon-Cell Interconnected Networks

In communication system of network routing algorithm acts an important role. The efficiency of a parallel system depends on the reliable and efficient routing algorithm which is used to route the messages between the fau...

Outlier Resistant Time Series Operations via Qualitative Robustness and Saddle‐Point Game Formalizations‐ A Review: Filtering and Smoothing

Time series operations are sought in numerous applications, while the observations used in such operations are generally contaminated by data outliers. The objective is thus to design outlier resistant or “robust” time s...

Download PDF file
  • EP ID EP301397
  • DOI 10.14738/tnc.52.2764
  • Views 64
  • Downloads 0

How To Cite

Abdulqader A. Bahaj, Ahmed M. Abouollo (2017). Achieving Scalability with Data Owner Anonymity in Cloud Access Control. Transactions on Networks and Communications, 5(2), 7-14. https://europub.co.uk/articles/-A-301397