TMACS: a robust and verifiable threshold multiauthority access control system in public cloud Storage

Abstract

It greatly attracts attention and interest from both academia and industry due to the profitability, but it also have challenges that must be handled before coming to our real life to the best of our knowledge. Data confidentiality should be guaranteed. The data privacy is not only about the data contents. Since the most attractive part of the cloud computing is the computation outsourcing, it is far beyond enough to just conduct an access control. Secondly, personal information (defined by each user’s attributes set) is at risk because one’s identity is authenticated based on his information for the purpose of access control (or privilege control in this paper). As people are becoming more concerned about their identity privacy these days, the identity privacy also needs to be protected before the cloud enters our life. Preferably, any authority or server alone should not know any client’s personal information. Last but not least, the cloud computing system should be resilient in the case of security breach in which some part of the system is compromised by attackers.

Authors and Affiliations

Ardra K, T Sivakumar

Keywords

Related Articles

Establishment of Regenerative Callus, Cell Suspension System and Molecular Characterization of Stevia Rebaudiana Bertoni for the Production of Stevioside in In Vitro

An efficient and standardized medium for callus induction was developed using leaf explants cultured on MS medium supplemented with 1.0mgl-1 1-Naphthaleneacetic acid (NAA) and 1.0 mgl-1 2,4-dichlorophenoxyacetic acid (2...

ߜመ ࣓Closed Sets in Ideal Topological Space

In this paper the notion of ࣓෡ࢾclosed sets is introduced and some of its basic properties are studied. This new class of setsisindependentofsemiclosedand closed sets. Also the relationship with some of the known closed...

Hyper-Threading Technology in Microprocessor

Hyper-Threading Technology is a form of simultaneous multithreading technology. Architecturally, a processor with Hyper-Threading Technology consists of two logical processors per core, each of which has its own process...

Stability of Vitamins in Pharmaceutical Preparations- A Review

Vitamins are one of the few groups of food constituents in which it is possible to demonstrate quantitatively deterioration in content over a period. The rate of this reduction in vitamin content is influenced by a numb...

Differential Protection of Power Transformer Using Simulink

In this research work we propose a simple and effective technique based on the Clark’s transformation. Which avoiding the mal-operation of differential protection relays during inrush currents and trip signal generated...

Download PDF file
  • EP ID EP23883
  • DOI http://doi.org/10.22214/ijraset.2017.4177
  • Views 298
  • Downloads 8

How To Cite

Ardra K, T Sivakumar (2017). TMACS: a robust and verifiable threshold multiauthority access control system in public cloud Storage. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(4), -. https://europub.co.uk/articles/-A-23883