A Multi-Authority Access Control System in Cloud Computing Using Network Security
Abstract
the data security in the cloud.and Attribute-based Encryption
(ABE) technique cryptographic conducting tool to guarantee data
owners direct control on their data in public cloud storage. In
this paper, from another point of view, system lead an edge multipower CP-ABE access control plan for open distributed storage,
named TMACS. In TMACS, exploiting (t; n) limit mystery
sharing, When system verify to the user the TTP work like a
SDN. Its having data controller that can evaluate the each request
base on ad-hoc data table, if user is authenticated system can
provide the access to specific user. Besides, by proficiently joining
the customary multi-power plan with system, system build a
half and half one, which fulfils the situation of traits originating
from various powers and accomplishing security and framework
level strength. The network security mechanism also fulfil with
this approach, the system has evaluate on physical network
environment with 2 to 4 physical devices and got satisfactory
results than existing TMACS
Full Text:
PDFReferences
[1]. Wei Li, KaipingXue, YingjieXue, and Jianan Hong, TMACS: A
Robust and Verifiable Threshold Multi-Authority Access Control System
in Public Cloud Storage, IEEE Transactions on parallel and distributed
systems, VOL.24, NO. 06, October 2016.
K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, DAC-MACS: Effective
data access control for multi-authority cloud storage systems, 2013
Proceedings IEEE INFOCOM Year: 2013. OR [2]. Jianan Hong; Kaiping
Xue; Wei Li Comments on DAC-MACS: Effective Data Access Control
for Multiauthority Cloud Storage Systems/Security Analysis of Attribute
Revocation in Multiauthority Data Access Control for Cloud Storage
Systems IEEE Transactions on Information Forensics and Security, Year:
, Volume: 10, Issue: 6
Taeho Jung, Xiang-Yang Li, Zhiguo Wan, and Meng Wan, Control
Cloud Data Access Privilege and Anonymity with Fully Anonymous
Attribute-Based Encryption, IEEE transactions on information forensics
and security, VOL. 10, NO. 01, January 2015.
Kan Yang and XiaohuaJia, Expressive, Efficient, and Revocable Data
Access Control for Multi-Authority Cloud Storage, IEEE Transactions
on parallel and distributed systems, VOL. 25, NO. 07, July 2014.
S. Kamara and K. Lauter, ”Cryptographic cloud storage,” in Proceedings
of the 14th Financial Cryptography and Data Security.Springer, 2010,
pp. 136-149. [6] R.Ostrovsky, A. Sahai, and B.Waters, ”Attribute-based
encryption with nonmonotonic access structures,” in Proceedings of the
th ACM conference on Computer and communications security. ACM,
, pp. 195-203.
W. Xia, Y. Wen, C. Heng Foh, D. Niyato, and H. Xie, A survey
on software-defined networking, IEEE Communications Surveys and
Tutorials, vol. 17, no. 1, pp. 2751, 2015. View at Publisher View at
Google Scholar View at Scopus
]. Hideaki Ishii, Roberto Tempo, and Er-Wei Bai, Mona: Secure MultiOwner Data Sharing for Dynamic Groups in the Cloud, IEEE Transactions on parallel and distributed systems, VOL. 24, NO. 06, June 2013.
M. Chase and S. Chow, Improving privacy and security in multi authority
attribute-based encryption, in Proceedings of the 16th ACM conference
on Computer and communications security. ACM, 2009, pp. 121130.
Mohamed Nabeel and Elisa Bertino, Fellow, IEEE, Privacy Preserving
Delegated Access Control in Public Clouds, IEEE Transactions on
Knowledge and Data Engineering, Vol. 26, Issue 9, pp.2268-2280, 2014
]. Z. Liu and Z. Cao, ”On efficiently transferring the linear secret
sharing scheme matrix in ciphertext-policy attribute-based encryption,”
IACR Cryptology ePrint Archive, vol. 2010, p. 374, 2010.
S. Patil, P. Vhatkar, and J. Gajwani, ”Towards secure and dependable
storage services in cloud computing,” International Journal of Innovative
Research in Advanced Engineering, vol. 1, no. 9, pp. 57-64, 2014.
N. Attrapadung, B. Libert, and E. Panaeu, ”Expressive key policy
attribute based encryption with constant-size ciphertexts,” in Proceedings
of the 14th International Conference on Practice and Theory in Public
Key Cryptography. Springer, 2011, pp. 90 108.
Luca Ferretti, Michele Colajanni, and MircoMarchetti, Distributed,
Concurrent, and Independent Access to Encrypted Cloud Databases, IEEE
Transactions on Parallel and Distributed Systems, Vol. 25, Issue 2, pp.437-
,2014
Open Networking Foundation (ONF), https://www.opennetworking.org/
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology