Cryptographic Cloud Storage with Anonymous Authentication (original) (raw)
Related papers
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
International Journal of Scientific Research in Science and Technology, 2019
The paper proposes a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user's identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication and access control scheme are decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches.
Anonymous authentication for secure data stored on cloud with decentralized access control
2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016
In this review paper of decentralized access control schemes are reviewed for secure information storage on cloud. In centralized network storage, data is not secure, data accessing for different user is difficult, updating data is also not that easy, to overcome all these issues decentralized schemes are considered. A decentralized access control scheme with anonymous authentication provides user revocation and prevents replay attacks. The cloud does not know the identity of the user who stores information, but only verifies the user's credentials. Fine-grained access control scheme grants different access control policies to user to do operations on their data. Key distribution is done in a decentralized way. Data stored in clouds is highly sensitive. These schemes gives secure data storage in decentralized network compared to centralized network.
Decentralized Access Control With Anonymous Authentication for Secure Data Storage on Cloud
Cloud computing, as a prominent computing paradigm, enables users to remotely store their data/information into a cloud so as to enjoy scalable services on-demand. The issue of scalability and data confidentiality of access control really still remains uncertain. Proposed scheme address these issues data storage, time required for accessing data, user revocation and prevents replay attacks. Access control is processed on decentralized key distribution centers it is being more secure for data encryption. Generated decentralized key distribution centers are then grouped by (KGC). Proposed system provides authentication for the user, in which only authorized users are able to securely store and view the stored information. User validations and access control scheme are introduced in decentralized, which is required for preventing replay attacks and supports modification of data stored in the cloud. The access control scheme is gaining more attention because it is important that only approved users have access to valid examine. Proposed scheme supports creation, replay attacks, reading and modify data stored in the cloud. We also address user revocation. The problems of validation, access control, privacy protection should be solved simultaneously.
Authentication of Data Storage using Decentralized Access Control in Clouds
2014
In this paper, we propose the secure data storage in clouds for a new decentralized access . The cloud verifies the authenticity of the series without knowing the user's identity in the proposed scheme . Our feature is that only valid users can able to decrypt the stored information. It prevents from the replay attack . This scheme supports creation, modification, and reading the data stored in the cloud and also provide the decentralized authentication and robust. It can be comparable to centralized schemes for the communication of data, computation of data, and storage of data.
Decentralized Access Control scheme for secure Data Stored in Clouds.pdf
We propose a new decentralized access control scheme which is used for secure the data storage in clouds. In the proposed scheme, the cloud verifies the authenticity without knowing the user's identity before storing data. Our scheme is also added the feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches.
Decentralized Anonymous User Authentication For Securing Data Storage in Cloud
Citation/Export MLA Shital S. Pagar, Snehal M. Baviskar, Vandana N. Chalwadi, Prof. Kavita S. Kumavat, “Decentralized Anonymous User Authentication For Securing Data Storage in Cloud”, January 15 Volume 3 Issue 1 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 05 - 10, DOI: 10.17762/ijritcc2321-8169.150102 APA Shital S. Pagar, Snehal M. Baviskar, Vandana N. Chalwadi, Prof. Kavita S. Kumavat, January 15 Volume 3 Issue 1, “Decentralized Anonymous User Authentication For Securing Data Storage in Cloud”, International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 05 - 10, DOI: 10.17762/ijritcc2321-8169.150102
Cloud Based Decentralized and Authenticated Cryptographic Data Sharing
Many cloud based model and cloud security techniques have been proposed for securing storage system. In the most existing system, data storage occurs in the third party concern so it is very difficult to ensure data confidentiality. However, we have to ensure strong data confidentiality in storage servers by using encryption scheme but there is a limit in functionality. This paper presents a decentralized architecture for the storage system to improve the scalability over the distributed environment for encoding and storing of data.
Decentralized Access Control Schemes for Data Storage on Cloud
2016
In this review paper of decentralized access control schemes are reviewed for secure information storage on cloud. In centralized network storage, data is not secure, data accessing for different user is difficult, updating data is also not that easy, to overcome all these issues decentralized schemes are considered. A decentralized access control scheme with anonymous authentication provides user revocation and prevents replay attacks. The cloud does not know the identity of the user who stores information, but only verifies the user’s credentials. Fine-grained access control scheme grants different access control policies to user to do operations on their data. Key distribution is done in a decentralized way. Data stored in clouds is highly sensitive. These schemes gives secure data storage in decentralized network compared to centralized network.
Cloud Computing: Ensuring Data Storage Security in Cloud
International Journal of Engineering Development and Research, 2016
Cloud computing is a rising computing standard in which the computing framework is given as a service over the Internet. The Cloud computing tool gives facility of data storage and access for cloud users, but when outsourcing the data to a third party causes safety issue of cloud data so data are protected by restricting the data. We propose a new decentralized access control scheme for secure data storage in the clouds that supports anonymous authentication where identity of the user is protected from the cloud during authentication. The architecture is decentralized, meaning that there can be several KDCs for key management. Revoked users cannot access data after they have been revoked. The proposed scheme is resilient to replay attacks. In addition to this a new symmetric key cryptographic method called Modern encryption Standard (MES)-II presents method which can be effective to encrypt various types of plain text files and the method is free from standard cryptography attacks n...
International Journal Of Engineering And Computer Science, 2016
Cloud computing is a rising computing standard in which assets of the computing framework are given as a service over the Internet. It delivers new challenges for data security and access control when clients outsource sensitive data for offering on cloud servers. These results unavoidably present a substantial processing overhead on the data possessor for key distribution and data administration when fine-grained data access control is in demand, and subsequently don't scale well. The issue of at the same time accomplishing fine-graininess, scalability, and data confidentiality of access control really still remains uncertain. The system characterize and implements access policies based on data qualities, and, then again, permits the data owner to represent the majority of the calculation included in fine-grained data access control to un-trusted cloud servers without unveiling the underlying data substance. This can be achieved by exploiting and combining techniques of decentralized key policy Attribute Based Encryption (KP-ABE). The proposed approach is highly efficient and secure. Also Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing it also represents several new deduplication constructions supporting authorized duplicate check in hybrid decentralized cloud architecture.