A Multi-Authority Access Control System in Cloud Computing Using Network Security

Ms. Vibhute Shubhangi Prakash, Prof. Mr. Kale Navnath D.

Abstract


Data access control is an efficient way to provide
the data security in the cloud.and Attribute-based Encryption
(ABE) technique cryptographic conducting tool to guarantee data
owners direct control on their data in public cloud storage. In
this paper, from another point of view, system lead an edge multipower CP-ABE access control plan for open distributed storage,
named TMACS. In TMACS, exploiting (t; n) limit mystery
sharing, When system verify to the user the TTP work like a
SDN. Its having data controller that can evaluate the each request
base on ad-hoc data table, if user is authenticated system can
provide the access to specific user. Besides, by proficiently joining
the customary multi-power plan with system, system build a
half and half one, which fulfils the situation of traits originating
from various powers and accomplishing security and framework
level strength. The network security mechanism also fulfil with
this approach, the system has evaluate on physical network
environment with 2 to 4 physical devices and got satisfactory
results than existing TMACS

Full Text:

PDF

References


[1]. Wei Li, KaipingXue, YingjieXue, and Jianan Hong, TMACS: A

Robust and Verifiable Threshold Multi-Authority Access Control System

in Public Cloud Storage, IEEE Transactions on parallel and distributed

systems, VOL.24, NO. 06, October 2016.

K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, DAC-MACS: Effective

data access control for multi-authority cloud storage systems, 2013

Proceedings IEEE INFOCOM Year: 2013. OR [2]. Jianan Hong; Kaiping

Xue; Wei Li Comments on DAC-MACS: Effective Data Access Control

for Multiauthority Cloud Storage Systems/Security Analysis of Attribute

Revocation in Multiauthority Data Access Control for Cloud Storage

Systems IEEE Transactions on Information Forensics and Security, Year:

, Volume: 10, Issue: 6

Taeho Jung, Xiang-Yang Li, Zhiguo Wan, and Meng Wan, Control

Cloud Data Access Privilege and Anonymity with Fully Anonymous

Attribute-Based Encryption, IEEE transactions on information forensics

and security, VOL. 10, NO. 01, January 2015.

Kan Yang and XiaohuaJia, Expressive, Efficient, and Revocable Data

Access Control for Multi-Authority Cloud Storage, IEEE Transactions

on parallel and distributed systems, VOL. 25, NO. 07, July 2014.

S. Kamara and K. Lauter, ”Cryptographic cloud storage,” in Proceedings

of the 14th Financial Cryptography and Data Security.Springer, 2010,

pp. 136-149. [6] R.Ostrovsky, A. Sahai, and B.Waters, ”Attribute-based

encryption with nonmonotonic access structures,” in Proceedings of the

th ACM conference on Computer and communications security. ACM,

, pp. 195-203.

W. Xia, Y. Wen, C. Heng Foh, D. Niyato, and H. Xie, A survey

on software-defined networking, IEEE Communications Surveys and

Tutorials, vol. 17, no. 1, pp. 2751, 2015. View at Publisher View at

Google Scholar View at Scopus

]. Hideaki Ishii, Roberto Tempo, and Er-Wei Bai, Mona: Secure MultiOwner Data Sharing for Dynamic Groups in the Cloud, IEEE Transactions on parallel and distributed systems, VOL. 24, NO. 06, June 2013.

M. Chase and S. Chow, Improving privacy and security in multi authority

attribute-based encryption, in Proceedings of the 16th ACM conference

on Computer and communications security. ACM, 2009, pp. 121130.

Mohamed Nabeel and Elisa Bertino, Fellow, IEEE, Privacy Preserving

Delegated Access Control in Public Clouds, IEEE Transactions on

Knowledge and Data Engineering, Vol. 26, Issue 9, pp.2268-2280, 2014

]. Z. Liu and Z. Cao, ”On efficiently transferring the linear secret

sharing scheme matrix in ciphertext-policy attribute-based encryption,”

IACR Cryptology ePrint Archive, vol. 2010, p. 374, 2010.

S. Patil, P. Vhatkar, and J. Gajwani, ”Towards secure and dependable

storage services in cloud computing,” International Journal of Innovative

Research in Advanced Engineering, vol. 1, no. 9, pp. 57-64, 2014.

N. Attrapadung, B. Libert, and E. Panaeu, ”Expressive key policy

attribute based encryption with constant-size ciphertexts,” in Proceedings

of the 14th International Conference on Practice and Theory in Public

Key Cryptography. Springer, 2011, pp. 90 108.

Luca Ferretti, Michele Colajanni, and MircoMarchetti, Distributed,

Concurrent, and Independent Access to Encrypted Cloud Databases, IEEE

Transactions on Parallel and Distributed Systems, Vol. 25, Issue 2, pp.437-

,2014

Open Networking Foundation (ONF), https://www.opennetworking.org/


Refbacks

  • There are currently no refbacks.


 

Copyright © IJETT, International Journal on Emerging Trends in Technology