Manage Cloud Data Access Control Anonymity with Attributed Based Encryption
Thirumanapally Prashanth1 , Gundu Purna Chandar Rao2
- Dept. of CSE, Hasvita Institute of Science and Technology, R.R District, India.
- Dept. of CSE, Osmania University, Hyderabad, India.
Correspondence should be addressed to: prashanth.thirumanpally@gmail.com.
Section:Research Paper, Product Type: Journal Paper
Volume-5 ,
Issue-10 , Page no. 373-376, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.373376
Online published on Oct 30, 2017
Copyright © Thirumanapally Prashanth, Gundu Purna Chandar Rao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Thirumanapally Prashanth, Gundu Purna Chandar Rao, “Manage Cloud Data Access Control Anonymity with Attributed Based Encryption,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.373-376, 2017.
MLA Citation
MLA Style Citation: Thirumanapally Prashanth, Gundu Purna Chandar Rao "Manage Cloud Data Access Control Anonymity with Attributed Based Encryption." International Journal of Computer Sciences and Engineering 5.10 (2017): 373-376.
APA Citation
APA Style Citation: Thirumanapally Prashanth, Gundu Purna Chandar Rao, (2017). Manage Cloud Data Access Control Anonymity with Attributed Based Encryption. International Journal of Computer Sciences and Engineering, 5(10), 373-376.
BibTex Citation
BibTex Style Citation:
@article{Prashanth_2017,
author = {Thirumanapally Prashanth, Gundu Purna Chandar Rao},
title = {Manage Cloud Data Access Control Anonymity with Attributed Based Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2017},
volume = {5},
Issue = {10},
month = {10},
year = {2017},
issn = {2347-2693},
pages = {373-376},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1531},
doi = {https://doi.org/10.26438/ijcse/v5i10.373376}
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i10.373376}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1531
TI - Manage Cloud Data Access Control Anonymity with Attributed Based Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - Thirumanapally Prashanth, Gundu Purna Chandar Rao
PY - 2017
DA - 2017/10/30
PB - IJCSE, Indore, INDIA
SP - 373-376
IS - 10
VL - 5
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
907 | 479 downloads | 290 downloads |




Abstract
Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.
Key-Words / Index Term
Cloud Computing, Anonymity, Multi Authority, Attribute-Based Encryption
References
[1] A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1985, pp. 47–53.
[2] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 457–473.
[3] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. 13th CCS, 2006, pp. 89–98.
[4] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased encryption,” in Proc. IEEE SP, May 2007, pp. 321–334.
[5] M. Chase, “Multi-authority attribute based encryption,” in Theory of Cryptography. Berlin, Germany: Springer-Verlag, 2007, pp. 515–534.
[6] M. Chase and S. S. M. Chow, “Improving privacy and security in multi-authority attribute-based encryption,” in Proc. 16th CCS, 2009, pp. 121–130.
[7] H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,” Inf. Sci., vol. 180, no. 13, pp. 2618–2632, 2010.