About this Journal  |  Author Guidelines  |   Submit a Manuscript     

International Journal of Advanced Research in Computer and Information Security

Volume 1, No. 1, 2017, pp 1-6
http://dx.doi.org/10.21742/ijacis.2017.1.1.01

Abstract



Data Control in Cloud Based Encryption



    K. Lahari
    1100-100 Department of Computer Science and Engineering, Priyadarshini Institute of Technology and Management, Guntur

    Abstract

    Cloud computing may be a revolutionary computing paradigm, that allows versatile, on-demand, and low-priced usage of computing resources, however the info is outsourced to some cloud servers, and varied privacy considerations emerge from it. Varied schemes supported the attribute-based coding are planned to secure the cloud storage. However, most work focuses on the info contents privacy and therefore the access management, whereas less attention is paid to the privilege management and therefore the identity privacy. During this paper, we tend to gift a semi anonymous privilege management theme AnonyControl to deal with not solely the info privacy, however conjointly the user identity privacy in existing access management schemes. AnonyControl decentralizes the central authority to limit the identity outpouring and therefore achieves semi anonymity. Besides, it conjointly generalizes the file access management to the privilege management, by that privileges of all operations on the cloud knowledge are often managed in a very fine-grained manner. Afterwards, we tend to gift the AnonyControl-F, that absolutely prevents the identity outpouring and reach the complete obscurity. Our security analysis shows that each AnonyControl and AnonyControl-F square measure secure underneath the decisional linear Diffie–Hellman assumption and our performance analysis exhibits the practicability of our schemes.


 

Contact Us

  • PO Box 5074, Sandy Bay Tasmania 7005, Australia
  • Phone: +61 3 9028 5994