Secure Data Storage in Cloud with Decentralized Access Control Scheme and Anonymous Authentication
Abstract
Our paper proposes a decentralized access control scheme for storing data or file in cloud securely with anonymous authentication. Authenticity of the content will be verified without knowing the user’s identity with the help of attribute based signature. Data will be encrypted under attribute based encryption and it will be decrypted only for users with attributes specified by the access policy using their key. Encryption and decryption keys are provided through decentralized scheme with two or more KDC’s and access control is provided by access control schemes which defines who have access to data.
Keywords
Full Text:
PDFReferences
Wang et al and C.Wang, Q.Wang, K.Ren, N. Cao, and W.Lou”Toward Secure and Dependable Storage Services in cloud Computing”.
H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-Based Authentication For Cloud Computing,”
MiniqiZhou, RongZhang “Security and Privacy in Cloud Computing: A Survey”
Ferraiolo DF and Kuhun DR. 1992 “Role Based Access Control”
http://securesoftwaredev.com/2012/08/20/xacml-in-the-cloud/
Reeja S.L “Role based access control mechanism”
http://www.slideshare.net/prosunjit/attribute-based-encryption
https://www.cs.utexus.edu/~bwaters/publications/papers/cp-abe.pdf
SushmitaRuj “Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”.
Martin Sosniak “Linear secret sharing schemes and constructions of monotone span programs”
https://eprint.iacr.org/2010/374.pdf
J.C.Benaloh and J.Leichter “Generalized Secret Sharing and Monotone Functions”.
Jin Li, Xiaofeng Chen “Secure Outsourced Attribute Based Signature”
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.