Open Access Open Access  Restricted Access Subscription or Fee Access

Flexible Authentication with User Revocation for DAC in Cloud

G. Keerthi, Golda Selia

Abstract


We suggest a decentralized access management theme for safe information storage and versatile authentication for file sharing. The cloud authorizes the credibility of the sequences while not revealing the user’s identity for storing information. There’s a feature of access management during which solely legal users will rewrite the file hold on in cloud. The theme provides user revocation that prevents replay attacks on file hold on within the cloud. Additionally the corrupted files will be recovered by string matching formula. Also the file owner will have log about when the file has been edited by other users.


Keywords


Access Control, Authentication, Access Policy, File Recovery, Activity Log

Full Text:

PDF

References


Sushmita Ruj, Milos stojmenovic and AmiyaNayak, “Decentralized access control With Anonymous Authentication Of Data Stored in clouds”,IEEE transactions on parallel and distributed systems vol:25 no:2,2014

Hur.J and Kun Noh.D, “Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems”, IEEE Trans. Parallel Distrib.Syst., vol. 22, no. 7, pp. 1214–1221, 2011

Kan Yang, XiaohuaJia and KuiRen, “DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems”, IACR Cryptology ePrint Archive, 419, 2012.

Kamara.Sand Lauter.K, “Cryptographic cloud storage,” in Financial Cryptography Workshops, ser. Lecture Notes in Computer Science, vol.6054. Springer, pp. 136–149, 2010.

Li .H, Dai.Y, Tian.L, and Yang.H, “Identity-based authentication for cloud computing,” in CloudCom, ser. Lecture Notes in Computer Science, vol.5931. Springer, pp. 157–166, 2009.

Lewko.A.Band Waters.B, “Decentralizing attribute-based encryption,” in EUROCRYPT, ser. Lecture Notes in Computer Science, vol. 6632. Springer, pp. 568–588, 2011.

Maji.H.K, Prabhakaran.M, and Rosulek.M, “Attribute-based signatures:Achieving attribute-privacy and collusion-resistance,” IACR Cryptology ePrint Archive, 2008.

Ruj.S, Nayak.A, and Stojmenovic.I, “DACC: Distributed access control in clouds,” in IEEE TrustCom, 2011.

Ruj S, Stojmenovic.M and Nayak.A, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds”, IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 556–563, 2012.

Yu.S, Wang.C, Ren.K, and Lou.W, “Attribute based data sharing with attribute revocation,” in ACM ASIACCS, pp. 261–270, 2010.

F. Zhao, T. Nishide, and K. Sakurai, “Realizing Fine- Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems,” Proc. Seventh Int’l Conf. Information Security Practice and Experience (ISPEC), pp. 83-97, 2011.

J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy Keyword Search Over Encrypted Data in Cloud Computing,” Proc. IEEE INFOCOM, pp. 441- 445, 2010.

Keerthi B , Rajesh kannan V,” Implementation of Attribute Hiding Strategy and Key Revocation in Cloud Environment”, International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 2, April 2014.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.