Achieving Scalability with Data Owner Anonymity in Cloud Access Control
Journal Title: Transactions on Networks and Communications - Year 2017, Vol 5, Issue 2
Abstract
Cloud computing is a trending technology that enables subscribing organizations to outsource computations and storage, and eliminates the need of purchasing and maintaining the equipment by the organizations themselves. However, it is very challenging to maintain the privacy and security of data especially when the number of users grows dramatically. This paper focuses on achieving a high level of scalability to the cloud, allowing fine-grained access control, preserving the anonymity of the data owner and enabling the end user to verify the integrity of the data uploaded to the cloud. In order to achieve this, this paper proposes an effective scheme that uses Ciphertext Policy Attribute Based Encryption (CPABE) combined with identity-based encryption (IBE), and introduces a security mediator which signs files on behalf of the data owner to preserve the data owner’s anonymity from the cloud. This scheme allows the end user to check the integrity of the data on the cloud.
Authors and Affiliations
Abdulqader A. Bahaj, Ahmed M. Abouollo
Isolation of Water Inflow to Production Wells
N/A
The Blockchain: Overview of “Past” and “Future”
Variety of network technologies deployed for ease of use and emerging technologies developed for better communication, enhanced security and faster delivery. The global financial crash of 2007-2008 created a lot of distr...
Whisper: A High Capacity File Encrypting and Hiding Method in an Audio File
The advance of internet and multimedia allows for tremendous transferring of digital media data and the percentage of time that users spend in online activity and exchanging important information is increasing day by day...
Hierarchy Website Fingerprint Using N-gram Byte Distribution
According to www.internetlivestats.com, there are over one billion websites on the world wide web (WWW) today while in 1991, there were only one single website. Websites classification based on traffic analysis has becom...
Outlier Resistant Time Series Operations via Qualitative Robustness and Saddle‐Point Game Formalizations‐ A Review: Filtering and Smoothing
Time series operations are sought in numerous applications, while the observations used in such operations are generally contaminated by data outliers. The objective is thus to design outlier resistant or “robust” time s...