Open Access   Article Go Back

Manage Cloud Data Access Control Anonymity with Attributed Based Encryption

Thirumanapally Prashanth1 , Gundu Purna Chandar Rao2

  1. Dept. of CSE, Hasvita Institute of Science and Technology, R.R District, India.
  2. Dept. of CSE, Osmania University, Hyderabad, India.

Correspondence should be addressed to: prashanth.thirumanpally@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-10 , Page no. 373-376, Oct-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i10.373376

Online published on Oct 30, 2017

Copyright © Thirumanapally Prashanth, Gundu Purna Chandar Rao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Thirumanapally Prashanth, Gundu Purna Chandar Rao, “Manage Cloud Data Access Control Anonymity with Attributed Based Encryption,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.373-376, 2017.

MLA Style Citation: Thirumanapally Prashanth, Gundu Purna Chandar Rao "Manage Cloud Data Access Control Anonymity with Attributed Based Encryption." International Journal of Computer Sciences and Engineering 5.10 (2017): 373-376.

APA Style Citation: Thirumanapally Prashanth, Gundu Purna Chandar Rao, (2017). Manage Cloud Data Access Control Anonymity with Attributed Based Encryption. International Journal of Computer Sciences and Engineering, 5(10), 373-376.

BibTex Style Citation:
@article{Prashanth_2017,
author = {Thirumanapally Prashanth, Gundu Purna Chandar Rao},
title = {Manage Cloud Data Access Control Anonymity with Attributed Based Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2017},
volume = {5},
Issue = {10},
month = {10},
year = {2017},
issn = {2347-2693},
pages = {373-376},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1531},
doi = {https://doi.org/10.26438/ijcse/v5i10.373376}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i10.373376}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1531
TI - Manage Cloud Data Access Control Anonymity with Attributed Based Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - Thirumanapally Prashanth, Gundu Purna Chandar Rao
PY - 2017
DA - 2017/10/30
PB - IJCSE, Indore, INDIA
SP - 373-376
IS - 10
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
751 323 downloads 184 downloads
  
  
           

Abstract

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.

Key-Words / Index Term

Cloud Computing, Anonymity, Multi Authority, Attribute-Based Encryption

References

[1] A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1985, pp. 47–53.
[2] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 457–473.
[3] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. 13th CCS, 2006, pp. 89–98.
[4] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased encryption,” in Proc. IEEE SP, May 2007, pp. 321–334.
[5] M. Chase, “Multi-authority attribute based encryption,” in Theory of Cryptography. Berlin, Germany: Springer-Verlag, 2007, pp. 515–534.
[6] M. Chase and S. S. M. Chow, “Improving privacy and security in multi-authority attribute-based encryption,” in Proc. 16th CCS, 2009, pp. 121–130.
[7] H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,” Inf. Sci., vol. 180, no. 13, pp. 2618–2632, 2010.