Cryptographic Cloud Storage with Anonymous Authentication

Authors

  • S. Meera  Dhanalakshmi College of Engineering, Chennai, Tamil Nadu, India
  • G. Nasreen Hameeda Banu  Dhanalakshmi College of Engineering, Chennai, Tamil Nadu, India
  • V.Vaishnavi  Dhanalakshmi College of Engineering, Chennai, Tamil Nadu, India
  • S. Geetha Rani  Dhanalakshmi College of Engineering, Chennai, Tamil Nadu, India

Keywords:

Attribute-based encryption, Secure cloud storage, Privacy Preservation, Anonymous Authentication, Decentralized Access Control

Abstract

We propose a new decentralized access control scheme for protected data storage in clouds that affirms anonymous authentication. In this paper, the cloud verifies the authenticity without knowing the user’s identity before storing data. Our paper has the added feature of access control in which only validated users are able to decrypt the stored information. Here we also forbid replay attacks and supports creation, modification, and reading of information stored in the cloud. We also cover user revocation and here the authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized.

References

  1. R.K.L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang, and B.S. Lee, “Trustcloud: A Framework for Accountability and Trust in Cloud Computing,” HP Technical Report HPL-2011-38, http://www.hpl.hp.com/techreports/ 2011/HPL-2011-38.html, 2013.
  2. http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf, 2013.
  3. http://securesoftwaredev.com/2012/08/20/xacml-in-the-cloud, 2013.
  4. S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds,” Proc. IEEE/ACM Int’l Symp. Cluster, Cloud and Grid Computing, pp. 556-563, 2012.
  5. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,”
  6. IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.-June 2012.
  7.  F. Zhao, T. Nishide, and K. Sakurai, “Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems,” Proc. Seventh Int’l Conf. Information Security Practice and Experience (ISPEC), pp. 83-97, 2011.
  8. F. Zhao, T. Nishide, and K. Sakurai, “Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems,” Proc. Seventh Int’l Conf. Information Security Practice and Experience (ISPEC), pp. 83-97, 2011.
  9. S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed Access Control in Clouds,” Proc. IEEE 10th Int’l Conf. Trust, Security and Privacy in Computing and Communications (TrustCom), 2011.
  10. S. Jahid, P. Mittal, and N. Borisov, “EASiER: Encryption-Based Access Control in Social Networks with Efficient Revocation,”
  11. Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), 2011.
  12. M. Green, S. Hohenberger, and B. Waters, “Outsourcing the Decryption of ABE Ciphertexts,” Proc. USENIX Security Symp., 2011.
  13. A.-R. Sadeghi, T. Schneider, and M. Winandy, “Token-Based Cloud Computing,” Proc. Third Int’l Conf. Trust and Trustworthy Computing (TRUST), pp. 417-429, 2010.
  14. R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing,” Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 282-292, 2010.
  15. D.R. Kuhn, E.J. Coyne, and T.R. Weil, “Adding Attributes to Role-Based Access Control,” IEEE Computer, vol. 43, no. 6, pp. 79-81, June 2010.
  16. M. Li, S. Yu, K. Ren, and W. Lou, “Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings,” Proc. Sixth Int’l ICST Conf. Security and Privacy in Comm. Networks (SecureComm), pp. 89-106, 2010.
  17. S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based Data Sharing with Attribute Revocation,” Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 261-270, 2010.
  18. G. Wang, Q. Liu, and J. Wu, “Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services,” Proc. 17th ACM Conf. Computer and Comm. Security (CCS), pp. 735-737, 2010.
  19. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy Keyword Search Over Encrypted Data in Cloud Computing,”
  20. Proc. IEEE INFOCOM, pp. 441-445, 2010.
  21. S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. 14th Int’l Conf. Financial Cryptography and Data Security, pp. 136-149, 2010.

Downloads

Published

2015-11-05

Issue

Section

Research Articles

How to Cite

[1]
S. Meera, G. Nasreen Hameeda Banu, V.Vaishnavi, S. Geetha Rani, " Cryptographic Cloud Storage with Anonymous Authentication, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 1, Issue 4, pp.282-285, September-October-2015.