Decentralized and Secured Data Sharing in Distributed Cloud Environment

Priyanka M. Salunke, Santosh Kumar


In this paper we proposed advance decentralized scheme for
secure data storage in clouds, which supports hiding identity
& access policy of user’s with anonymous authentication.
Data on cloud is sensitive and so as the user and his identity.
It is necessary to the user identity from cloud. Our proposed
system deals with the data security and hiding user identity.
We are using Anonymous authentication decentralized access
control system for storing the data securely on cloud. With
prevention from replay attacks our scheme also support
creation, modification, and reading data stored in the cloud
and also the users attributes are also kept hidden. We are
using Trustee for hiding the user identity; where the user will
be know by unique tokens. Along with this our scheme will
also deal with user revocation. As compare to other schemes
our scheme is decentralized and robust. The efficiency of the
proposed schemes is tested by comparing communication,
computation and storage overheads with centralized

Full Text:



S. Jahid, P. Mittal, and N. Borisov, "EASiER:

Encryption-based access control in social networks

with efficient revocation," in ACM ASIACCS, 2011.

C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou,

"Toward Secure and Dependable Storage Services in

Cloud Computing", IEEE T. Services Computing, vol.

, no. 2, pp. 220–232, 2012.

H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based

authentication for cloud computing," in CloudCom,

ser. Lecture Notes in Computer Science, vol. 5931.

Springer, pp. 157–166, 2009.

C. Gentry, "A fully homomorphic encryption scheme,"

Ph.D. dissertation, Stanford University, 2009,

A.-R. Sadeghi, T. Schneider, and M. Winandy,

"Token-based cloud computing," in TRUST, ser.

Lecture Notes in Computer Science, vol.

Springer, pp. 417–429, 2010.

W. Wang, Z. Li, R. Owens, and B. Bhargava, "Secure

and efficient access to outsourced data," in ACM

Cloud Computing Security Workshop (CCSW), 2009.


M. Li, S. Yu, K. Ren, and W. Lou, "Securing personal

health records in cloud computing: Patient-centric and

fine-grained data access control in multiowner

settings," in SecureComm, pp. 89–106, 2010.

S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based

data sharing with attribute revocation," in ACM

ASIACCS, pp. 261–270, 2010.

G. Wang, Q. Liu, and J. Wu, "Hierarchical attributebased

encryption for fine-grained access control in

cloud storage services," in ACM CCS, , pp. 735–737,

F. Zhao, T. Nishide, and K. Sakurai, "Realizing finegrained

and flexible access control to outsourced data

with attribute-based cryptosystems," in ISPEC, ser.

Lecture Notes in Computer Science, vol. 6672.

Springer, pp. 83–97, 2011.

S. Ruj, A. Nayak, and I. Stojmenovic, "DACC:

Distributed access control in clouds," in IEEE

TrustCom, 2011.

Kan Yang, Xiaohua Jia and Kui Ren, " DAC-MACS:

Effective Data Access Control for Multi-Authority

Cloud Storage Systems", IACR Cryptology ePrint

Archive, 419, 2012.

M. Chase, "Multi-authority attribute based

encryption," in TCC, ser. Lecture Notes in Computer

Science, vol. 4392. Springer, pp. 515–534, 2007.

H. Lin, Z. Cao, X. Liang and J. Shao, "Secure

Threshold Multi-authority Attribute Based Encryption

without a Central Authority," in INDOCRYPT, ser.

Lecture Notes in Computer Science, vol. 5365,

Springer, pp. 426–436, 2008.

M. Chase and S. S. M. Chow, "Improving privacy and

security in multiauthority attribute-based encryption,"

in ACM Conference on Computer andCommunications

Security, pp. 121–130, 2009.

A. B. Lewko and B. Waters, "Decentralizing attributebased

encryption," in EUROCRYPT, ser. Lecture Notes

in Computer Science, vol. 6632. Springer, pp. 568–

, 2011.

Matthew Green, Susan Hohenberger and Brent Waters,

"Outsourcing the Decryption of ABE Ciphertexts," in

USENIX Security Symposium, 2011.

Sushmita Ruj, Milos Stojmenovic, Amiya Nayak CSE,

Indian Institute of Technology, IIT, Indore,

India,Decentralized Access Control with Anonymous

Authentication of Data Stored in Clouds.

S. Ruj, M. Stojmenovic and A. Nayak, Privacy

Preserving Access Control with Authentication for

Securing Data in Clouds, IEEE/ACM International

Symposium on Cluster, Cloud and Grid Computing,

pp. 556563, 2012.

S. Yu, C. Wang, K. Ren, and W. Lou, Attribute based

data sharing with attribute revocation, in ACM

ASIACCS, pp. 261270, 2010.

J. Hur and D. Kun Noh, Attribute-Based Access

Control with Efficient Revocation in Data Outsourcing

Systems, IEEE Trans. Parallel Distrib. Syst., vol. 22,

no. 7, pp. 12141221, 2011.

J. Bethencourt, A. Sahai, and B. Waters, Ciphertextpolicy

attribute-based encryption, in IEEE Symposium

on Security and Privacy. , pp. 321334, 2007.

V. Goyal, O. Pandey, A. Sahai, and B. Waters,

Attribute-based encryption for finegrained access

control of encrypted data, in ACM Conference on

Computer and Communications Security, pp. 8998,

Matthew Green, Susan Hohenberger and Brent Waters,

Outsourcing the Decryption of ABE Ciphertexts, in

USENIX Security Symposium, 2011



  • There are currently no refbacks.

Copyright © IJETT, International Journal on Emerging Trends in Technology