Some Studies on Protection for the Hidden Attribute Based Signatures without Anonymity Revocation
Journal: International Journal of Trend in Scientific Research and Development (Vol.2, No. 6)Publication Date: 19/11/2018
Authors : S. Mahathi M. Ravindar;
Page : 585-591
Keywords : Computer Engineering; Cloud; privacy protection; Signatures; Revocation;
Abstract
The purpose of this paper is to study of access control scheme to protect users privacy in cloud environment is of great significance. In this paper, we present an access control system with privilege separation based on privacy protection. In the PS-ACS scheme, we divide the users into personal domain and public domain logically. In the PSD, we set read and write access permissions for users respectively. The Key-Aggregate Encryption is exploited to implement the read access permission which improves the access efficiency. A high degree of patient privacy is guaranteed simultaneously by exploiting an Improved Attribute-based Signature which can determine the users' write access. For the users of PUD, a hierarchical attribute-based encryption is applied to avoid the issues of single point of failure and complicated key distribution. Function and performance testing result shows that the PS-ACS scheme can achieve privacy protection in cloud based services. S. Mahathi | M. Ravindar "Some Studies on Protection for the Hidden Attribute Based Signatures without Anonymity Revocation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18575.pdf
Other Latest Articles
Last modified: 2018-11-19 19:15:14