Authors can submit their research articles to editor@ijsea.com  

Processing Charges

IJSEA is index with

 

 

 

 

 

 

 

IJSEA Archive (Volume 5, Issue 2)

International Journal of Science and Engineering Applications (IJSEA)  (Volume 5, Issue 2 March-April 2016)

A Survey on Different Techniques Used in Decentralized Cloud Computing

Mohini Tanaji Patil





 PDF 



Keywords: cloud security, auditing,security,ciphertext.

Abstract References BibText


        This paper proposes various methods for anonymous authentication for data stored in cloud. Cloud verifies the authenticity of the series without knowing the user’s identity before storing data. This paper also has the added feature of access control in which only valid users are able to decrypt the stored information. These schemes also prevents replay attacks and supports creation, modification, and reading data stored in the cloud. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches .The aim of this paper is to cover many security issues arises in cloud computing and different schemes to prevent security risks in cloud. Storage-as-a-service (Saas) offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their sensitive data to be stored on remote servers. In this paper, we propose a cloud-based storage schemes that allows the data owner to benefit from the facilities offered by the CSP and enables indirect mutual trust between them. This Paper provides different authentication techniques and algorithms for cloud security.


[1] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,”IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.Junen2012.
[2] H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-Based Authentication for Cloud Computing,” Proc. First Int’l Conf. Cloud Computing (CloudCom), pp. 157-166, 2009.
[3] R.K.L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M.Kirchberg, Q. Liang, and B.S. Lee, “Trustcloud: A Framework for Accountability and Trust in Cloud Computing,” HP Technical ReportHPL201138,http://www.hpl.hp.com/techreports/
[4] D.F. Ferraiolo and D.R. Kuhn, “Role-Based Access Controls,” Proc.15th Nat’l Computer Security Conf., 1992
[5] D.R. Kuhn, E.J. Coyne, and T.R. Weil, “Adding Attributes to Role Based Access Control,” IEEE Computer, vol. 43, no. 6, pp. 79-81,June 2010.
[6] G. Wang, Q. Liu, and J. Wu, “Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services,” Proc. 17th ACM Conf. Computer and Comm. Security (CCS), pp. 735-737, 2010.
[7] H.K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance,”IACR Cryptology ePrint Archive, 2008.
[8] H.K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-Based Signatures,” Topics in Cryptology - CT-RSA, vol. 6558, pp. 376-392,2011.
[9] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. ACM Conf. Computer and Comm. Security, pp. 89-98, 2006.
[10] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy, pp. 321-334, 2007.
[11] M. Chase and S.S.M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-BaseEncryption,” Proc. ACM Conf.Computer and Comm. Security, pp. 121-130, 2009.
[12] Sushmita Ruj,Milos Stojmenvovic and Amiya Nayak “Decentralized Access Control Anonymous Authentication Of Data Stored in Clouds ”IEEE TRANSACTIONS 2014


@article{Mohini05021007,
title = " A Survey on Different Techniques Used in Decentralized Cloud Computing ",
journal = "International Journal of Science and Engineering Applications (IJSEA)",
volume = "5",
number = "2",
pages = "092 - 094",
year = "2016",
author = " Mohini Tanaji Patil ",
}