A Comparision of Access Control Schemes for Cloud Data Privacy
Umar Khalid Farooqui1 , Ajay Kumar Bharti2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-10 , Page no. 392-395, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.392395
Online published on Oct 31, 2018
Copyright © Umar Khalid Farooqui, Ajay Kumar Bharti . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Umar Khalid Farooqui, Ajay Kumar Bharti, “A Comparision of Access Control Schemes for Cloud Data Privacy,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.392-395, 2018.
MLA Style Citation: Umar Khalid Farooqui, Ajay Kumar Bharti "A Comparision of Access Control Schemes for Cloud Data Privacy." International Journal of Computer Sciences and Engineering 6.10 (2018): 392-395.
APA Style Citation: Umar Khalid Farooqui, Ajay Kumar Bharti, (2018). A Comparision of Access Control Schemes for Cloud Data Privacy. International Journal of Computer Sciences and Engineering, 6(10), 392-395.
BibTex Style Citation:
@article{Farooqui_2018,
author = {Umar Khalid Farooqui, Ajay Kumar Bharti},
title = {A Comparision of Access Control Schemes for Cloud Data Privacy},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {392-395},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3036},
doi = {https://doi.org/10.26438/ijcse/v6i10.392395}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.392395}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3036
TI - A Comparision of Access Control Schemes for Cloud Data Privacy
T2 - International Journal of Computer Sciences and Engineering
AU - Umar Khalid Farooqui, Ajay Kumar Bharti
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 392-395
IS - 10
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
437 | 290 downloads | 225 downloads |
Abstract
Cloud deliver awesome comfort to its users as the user experience cloud services without having own hardware infrastructure. Now a day’s cloud services have important role on the internet as most of the services used by us are either cloud based or likely to be migrated in to cloud. The open architecture of cloud invites various security and vulnerability issues. The user data are outsourced and there is no strong privacy present between the user and cloud server because cloud uses third party intervention (which generally access the user data and auditing them). Outsourcing cloud data leads various vulnerability and privacy issues. Many researchers proposed different technique to address privacy preservation in the cloud computing, but still they are not 100% succeeded, some of them works on fine grained access control and some advocated attribute base access control scheme. In this paper, we made an attempt to compare two renowned privacy preservation schemes based on Fine Grained and Attribute based access control mechanism.
Key-Words / Index Term
Cloud Computing,privacy preservation,Fine Grained
References
[1] M.Thangavel,S.Sridhar, “An Analysis of privacy preservation schemes in cloud computing”,2nd IEEE International Conferenceon Engineering & Technology ,March 2016.
[2] J. K. Liu, M. H. Au, X. Huang, R. Lu, J. Li, “Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services,”, Transactions on Information Forensics and Security, Vol. 11, No. 3, pp. 484-497, March, 2016.
[3] Umar Khalid Farooqui,P.K.Bharti ,et . al. “A Review: privacy preservation in Cloud Environment issues and challenges”,IJRASET Volume 5 Issue VIII ,2017
[4] M. Thangavel, P. Varalakshmi, S. Sridhar, “An Analysis of Privacy Preservation Schemes in Cloud Computing”, 2nd IEEE International Conference on Engineering and Technology (ICETECH), 17th & 18th March 2016, Coimbatore, TN, India.
[5] H. Liu, H. Ning, Q. Xiong, L.T. Yang, “Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing,” Transactions on Parallel and Distributed Systems, Vol. 26, No. 1, pp241-251, January, 2015.
[6] Hong Liu, Student Member, IEEE, Huansheng Ning, Senior Member, IEEE, Qingxu Xiong, Member, IEEE, and Laurence T. Yang, Member, IEEE “Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing” , IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 26, NO. 1, JANUARY 2015.
[7] Sun, Yunchuan, et al. "Data security and privacy in cloud computing." International Journal of Distributed Sensor Networks (2014).
[8] L.A. Dunning, R. Kresman, “Privacy Preserving Data Sharing With
Anonymous ID Assignment”, Transaction on Information Forensics and Security, IEEE, Vol. 8, No. 2, pp. 402-413, February, 2013.
[9] P. Mell and T. Grance, “Draft NIST Working Definition of Cloud Computing,” Nat’l Inst. of Standards and Technology, 2009.
[10] M. H. Au, W. Susilo, and Y. Mu, “Constant-size dynamic k-TAA,” in Proc. 5th Int. Conf. SCN, 2006, pp. 111–125.
[11] J. Camenisch and A. Lysyanskaya, “Signature schemes and anonymous credentials from bilinear maps,” in Advances in Cryptology. Berlin,Germany: Springer-Verlag, 2004, pp. 56–72.
[12] J. Camenisch and A. Lysyanskaya, “A signature scheme with efficient protocols,” in Proc. 3rd Int. Conf. Secur. Commun. Netw. (SCN), Amalfi,Italy, Sep. 2002, pp. 268–289.
[13] R. Canetti, “Universally Composable Security: A New Paradigm for Cryptographic Protocols,” Proc. 42nd IEEE Symp. Foundations of Computer Science (FOCS ’01), pp. 136-145, Oct. 2001.
[14] D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,”in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2004,
pp. 41–55.
[15] H. K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-based signatures,” in Topics in Cryptology, vol. 6558. Berlin, Germany: Springer-Verlag, 2011, pp. 376–392.
[16] D. Boneh, X. Ding, and G. Tsudik, “Fine-grained control of
security capabilities,” ACM Trans. Internet Technol., vol. 4,
no. 1, pp. 60–82,
[17] A. Juels, D. Catalano, and M. Jakobsson, “Coercion-resistant electronic elections,” in Proc. WPES, 2005, pp. 61–70. 2004.
[18] T. Okamoto, “Receipt-free electronic voting schemes for large scale elections,” in Proc. 5th Int. Workshop Secur. Protocols, 1997, pp. 25–35