Implementing Preserved Access of Cloud Networking

Kaki Leela Prasad*, Pilaka Anusha**
*-** Assistant Professor, Vignan's Institute of Information Technology, Visakhapatnam, India.
Periodicity:January - June'2017
DOI : https://doi.org/10.26634/jcc.4.1.13753

Abstract

Cloud computing is an emerging technology for providing Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Security-as-a-Service (SaaS), which offers reduced capital expenditure, maintenance, complexity and we require a new security mechanism for distributed computing and server client computing. In this scenario, the authors have proposed a “Preserved access for cloud networking” that supports anonymous authentication for security issues. In this scheme, cloud performs some verification procedure to validate the authenticity of user and also has an added feature of access control in which only valid user can able to decrypt the stored data and also prevent replay attacks. Also they have addressed another important feature called user revocation when any user performs malicious operations on stored data.

Keywords

Access Control, Authentication of User, Attribute Based Signatures, Attribute Based Encryption, Cloud Storage.

How to Cite this Article?

Prasad. K., and Anusha. P (2017). Implementing Preserved Access of Cloud Networking. i-manager's Journal on Cloud Computing, 4(1), 8-14. https://doi.org/10.26634/jcc.4.1.13753

References

[1]. Ruj, S., Stojmenovic, M., & Nayak, A. (2012, May). Privacy preserving access control with authentication for securing data in clouds. In Cluster, Cloud and Grid th Computing (CCGrid), 2012 12 IEEE/ACM International Symposium on (pp. 556-563). IEEE.
[2]. Wang, C., Wang, Q., Ren, K., Cao, N., & Lou, W. (2012). Toward secure and dependable storage services in cloud computing. IEEE transactions on Services Computing, 5(2), 220-232.
[3]. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., & Lou, W. (2010, March). Fuzzy keyword search over encrypted data in cloud computing. In INFOCOM, 2010 Proceedings IEEE (pp. 1-5). IEEE.
[4]. Li, H., Dai, Y., Tian, L., & Yang, H. (2009). Identity-based authentication for cloud computing. Cloud computing, 157-166.
[5]. Yang,K., Jia,X., & Ren, K. (2013). DAC-MACS: Effective data access control for multi-authority cloud storage systems. In Security for Cloud Storage Systems (pp. 59- 83). Springer New York.
[6]. Munir, K., & Palaniappan, S. (2013). Framework for secure cloud computing. Advanced International Journal on Cloud Computing: Services and Architecture (IJCCSA), 3(2), 21-35.
[7]. Iropia, S. S., & Vijayalakshmi, R. (2014). Decentralized Access Control of Data Stored in Cloud using Key-Policy Attribute Based Encryption. International Journal of Inventions in Computer Science and Engineering, 1(2).
[8]. Bagchi, S. (Ed.). (2015). Emerging Research in Cloud Distributed Computing Systems. IGI Global.
[9]. Revathi, A., & Sharmil, M. N. (2015). Anonymous Authentication in Cloud using IBE and RSA. International Journal of Science and Innovative Engineering & Technology.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.