Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Secure Data Storage in Cloud with Decentralized Access Control Scheme and Anonymous Authentication


Affiliations
1 Department of CSE, Narasu's Sarathy Institute of Technology, Salem, India
     

   Subscribe/Renew Journal


Our paper proposes a decentralized access control scheme for storing data or file in cloud securely with anonymous authentication. Authenticity of the content will be verified without knowing the user’s identity with the help of attribute based signature. Data will be encrypted under attribute based encryption and it will be decrypted only for users with attributes specified by the access policy using their key. Encryption and decryption keys are provided through decentralized scheme with two or more KDC’s and access control is provided by access control schemes which defines who have access to data.


Keywords

Access Control, Cloud Storage, Attribute Based Encryption, Attribute Based Signature, Decentralized.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 224

PDF Views: 2




  • Secure Data Storage in Cloud with Decentralized Access Control Scheme and Anonymous Authentication

Abstract Views: 224  |  PDF Views: 2

Authors

S. RamaLakshmi
Department of CSE, Narasu's Sarathy Institute of Technology, Salem, India
V. Suganya
Department of CSE, Narasu's Sarathy Institute of Technology, Salem, India
B. Saranya
Department of CSE, Narasu's Sarathy Institute of Technology, Salem, India
V. Srinivasan
Department of CSE, Narasu's Sarathy Institute of Technology, Salem, India

Abstract


Our paper proposes a decentralized access control scheme for storing data or file in cloud securely with anonymous authentication. Authenticity of the content will be verified without knowing the user’s identity with the help of attribute based signature. Data will be encrypted under attribute based encryption and it will be decrypted only for users with attributes specified by the access policy using their key. Encryption and decryption keys are provided through decentralized scheme with two or more KDC’s and access control is provided by access control schemes which defines who have access to data.


Keywords


Access Control, Cloud Storage, Attribute Based Encryption, Attribute Based Signature, Decentralized.