Multiple Attribute Authority based Access Control and Anonymous Authentication in Decentralized Cloud
Journal Title: Bonfring International Journal of Data Mining - Year 2016, Vol 6, Issue 3
Abstract
Cloud computing is emerging as a powerful architecture to perform large-scale and complex computing. It widens the information technology (IT) capability by giving on-demand admittance to work out resources for dedicated use. The security information and privacy are the main concerns over the cloud from user viewpoint. In cloud computing cloud users and cloud severs are not present in the same domain. Due to this problem of data security and privacy, access control is required. Generally access control in clouds is centralized in environment. In centralized cloud system is given only with single key distribution Centre and makes use of symmetric key approach algorithm. But in decentralized cloud system multiple key distribution centres are available. So it is used to avoid the leakage of keys for malicious users. The proposed scheme is to hide the user's attributes using Attribute Based Encryption algorithm for providing Anony control. In this system the cloud confirm the authenticity of the user with no knowing the users identity before storing the data. This method contains an added feature of access control in which only the valid users are able to decrypt the stored information from cloud sever.
Authors and Affiliations
S. Usha , P. Sangeetha
Comparison of Estimators of Gumbel Distribution for Modelling Wind Speed Data
Estimation of extreme wind speed potential at a region is of importance while designing tall structures such as cooling towers, stacks, transmission line towers, etc. Assessment of wind speed in a region can expediently...
Consensus Clustering for Microarray Gene Expression Data
Cluster analysis in microarray gene expression studies is used to find groups of correlated and co-regulated genes. Several clustering algorithms are available in the literature. However no single algorithm is optimal fo...
Asymptotic Behavior Results for Nonlinear Impulsive Neutral Differential Equations with Positive and Negative Coefficients
This paper is focused on the following nonlinear impulsive neutral differential equation.., Sufficient conditions are obtained for every solution of (*) to tends to a constant as.,
Probabilistic Modelling of Hourly Rainfall Data for Development of Intensity-Duration-Frequency Relationships
The rainfall Intensity-Duration-Frequency (IDF) relationship is commonly required for planning and designing of various water resources projects. The IDF relationship is a mathematical relationship between the rainfall i...
Improving Efficiency of Apriori Algorithms for Sequential Pattern Mining
Computer Systems are exposed to an increasing number of different types of security threats due to the expanding of internet in recent years. How to detect network intrusions effectively becomes an important security tec...