Anonymous Access Control by SAPA in Cloud Computing
Author(s):
Gomathi.A,Mohanavalli.P
Year of Publication:
2015
International Journal of Computer Science and Engineering Communications
Abstract:
Cloud computing is rising as a prevailing information interactive paradigm to understand users’ information remotely hold on in a web cloud server. The present security solutions in the main specialize in the authentication to understand that a user’s privative information can not be unauthorized accessed, however neglect a delicate privacy issue throughout a user difficult the cloud server to request alternative users for information sharing. The challenged access request itself could reveal the user’s privacy regardless of whether or not or not it will acquire the information access permissions. In this paper, we tend to propose a shared authority primarily based privacy-preserving authentication protocol (SAPA) to deal with higher than privacy issue for cloud storage. within the SAPA, 1) shared access authority is achieved by anonymous access request matching mechanism with security and privacy issues (e.g., authentication, information obscurity, user privacy, and forward security); 2) attribute primarily based access management is adopted to understand that the user will solely access its own information fields; 3) proxy re-encryption is applied by the cloud server to produce information sharing among the multiple users. Meanwhile, universal composability (UC) model is engaging for multi-user cooperative cloud applications.
Keywords: Cloud computing, authentication protocol, privacy preservation, shared authority, universal compos ability.
INTRODUCTION
Cloud computing could be a promising info technology design for each enterprises and people .It launches a pretty information storage and interactive paradigm with obvious blessings, together with on-demand self-services, omnipresent network access ,and location freelance resource pooling . Towards the cloud computing, a typical service design is something as a service (XaaS), within which infrastructures, platform, software, et al square measure applied for omnipresent interconnections. Recent studies are worked to market the cloud computing evolve towards the net of services . later, security and privacy problems are getting key considerations with the increasing quality of cloud services .Conventional security approaches primarily concentrate on the sturdy authentication to appreciate that a user will remotely access its own information in on-demand mode alongside the range of the applying necessities ,users might want to access and share every other’s licensed information fields to realize productive edges, that brings new security and privacy challenges for the cloud storage.
For the final case, once the shopper stores his information on multi-cloud servers, the distributed storage and integrity checking square measure indispensable. On the opposite hand, the integrity checking protocol should be economical so as to create it appropriate for capacity-limited finish devices. Thus, supported distributed computation, we'll study distributed remote information integrity checking model and gift the corresponding concrete protocol in multi-cloud storage.
In the cloud environments, an affordable security protocol should attain the subsequent needs.
1) Authentication: a legal user will access its own information fields, only the approved partial or entire information fields are often identified by the legal user, and any cast or tampered data fields cannot deceive the legal user.
2) Information anonymity: any extraneous entity cannot acknowledge the changed data and communication state even it intercepts the exchanged messages via Associate in Nursing open channel.
3) User privacy: any extraneous entity cannot apprehend or guess a user’s access desire, that represents a user’s interest in another user’s approved information fields. If and providing the each users have mutual interests in every other’s approved data fields, the cloud server can inform the to users to realize the access permission sharing.