SLGP Header

Anonymous Access Control by SAPA in Cloud Computing

IJCSEC Front Page

Abstract:
Cloud computing is rising as a prevailing information interactive paradigm to understand users’ information remotely hold on in a web cloud server. The present security solutions in the main specialize in the authentication to understand that a user’s privative information can not be unauthorized accessed, however neglect a delicate privacy issue throughout a user difficult the cloud server to request alternative users for information sharing. The challenged access request itself could reveal the user’s privacy regardless of whether or not or not it will acquire the information access permissions. In this paper, we tend to propose a shared authority primarily based privacy-preserving authentication protocol (SAPA) to deal with higher than privacy issue for cloud storage. within the SAPA, 1) shared access authority is achieved by anonymous access request matching mechanism with security and privacy issues (e.g., authentication, information obscurity, user privacy, and forward security); 2) attribute primarily based access management is adopted to understand that the user will solely access its own information fields; 3) proxy re-encryption is applied by the cloud server to produce information sharing among the multiple users. Meanwhile, universal composability (UC) model is engaging for multi-user cooperative cloud applications.
Keywords: Cloud computing, authentication protocol, privacy preservation, shared authority, universal compos ability.
INTRODUCTION
Cloud computing could be a promising info technology design for each enterprises and people .It launches a pretty information storage and interactive paradigm with obvious blessings, together with on-demand self-services, omnipresent network access ,and location freelance resource pooling . Towards the cloud computing, a typical service design is something as a service (XaaS), within which infrastructures, platform, software, et al square measure applied for omnipresent interconnections. Recent studies are worked to market the cloud computing evolve towards the net of services . later, security and privacy problems are getting key considerations with the increasing quality of cloud services .Conventional security approaches primarily concentrate on the sturdy authentication to appreciate that a user will remotely access its own information in on-demand mode alongside the range of the applying necessities ,users might want to access and share every other’s licensed information fields to realize productive edges, that brings new security and privacy challenges for the cloud storage. For the final case, once the shopper stores his information on multi-cloud servers, the distributed storage and integrity checking square measure indispensable. On the opposite hand, the integrity checking protocol should be economical so as to create it appropriate for capacity-limited finish devices. Thus, supported distributed computation, we'll study distributed remote information integrity checking model and gift the corresponding concrete protocol in multi-cloud storage. In the cloud environments, an affordable security protocol should attain the subsequent needs. 1) Authentication: a legal user will access its own information fields, only the approved partial or entire information fields are often identified by the legal user, and any cast or tampered data fields cannot deceive the legal user. 2) Information anonymity: any extraneous entity cannot acknowledge the changed data and communication state even it intercepts the exchanged messages via Associate in Nursing open channel. 3) User privacy: any extraneous entity cannot apprehend or guess a user’s access desire, that represents a user’s interest in another user’s approved information fields. If and providing the each users have mutual interests in every other’s approved data fields, the cloud server can inform the to users to realize the access permission sharing.

References:

  1. Hong Liu, Student Member, IEEE, Huansheng Ning, Senior Member, IEEE, Qingxu Xiong , Member, IEEE ,and Laurence T. Yang,, Member, IEEE “Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing” 2014.
  2. L. A. Dunning and R. Kresman, “Privacy Preserving Data Sharing With Anonymous ID Assignment,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 2, pp. 402-413, 2013.
  3. X. Liu, Y. Zhang, B. Wang, and J. Yan, “Mona: Secure Multi- Owner Data Sharing for Dynamic Groups in the Cloud,” IEEE Transactions on Parallel and Distributed Systems, [online] ieeexplore. ieee.org/stamp/stamp .jsp? tp=&arnumber=6374615, 2013.
  4. S. Grzonkowski and P. M. Corcoran, “Sharing Cloud Services: User Authentication for Social Enhancement of Home Networking,”IEEE Transactions on Consumer Electronics, vol. 57, no. 3, pp.1424-1432, 2012.
  5. M. Nabeel, N. Shang and E. Bertino, “Privacy Preserving Policy Based Content Sharing in Public Clouds,” IEEE Transactions on Knowledge and Data Engineering, [online] ieeexplore. ieee.org/stamp/stamp.jsp? tp=&arnumber=6298891, 2012.
  6. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,” IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220-232, 2012.
  7. S. Sundareswaran, A. C. Squicciarini, and D. Lin, “Ensuring Distributed Accountability for Data Sharing in the Cloud,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 4, pp.556-568, 2012.
  8. Y. Tang, P. C. Lee, J. C. S. Lui, and R. Perlman, “Secure Overlay Cloud Storage with Access Control and Assured Deletion,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp.903-916, 2012.
  9. Y. Zhu, H. Hu, G. Ahn, D. Huang, and S. Wang, “Towards Temporal Access Control in Cloud Computing,” in Proceedings of the 31st Annual IEEE International Conference on Computer Communications (IEEE INFOCOM 2012), pp. 2576-2580, March 25-30, 2012.
  10. S. Ruj, M. Stojmenovic, and A. Nayak, “Decentralized Access Control with Anonymous Authentication for Securing Data in Clouds,”IEEE Transactions on Parallel and Distributed Systems, [online] ieeexplore.ieee.org/stamp/ stamp.jsp?tp=&arnumber=6463404,2011.