IDENTITY-BASED PRIVACY-PRESERVING ANONYMOUS AUTHENTICATION ACCESS CONTROL FOR SECURE CLOUD COMPUTING
Journal: Proceedings on Engineering Sciences (Vol.6, No. 3)Publication Date: 2024-09-30
Authors : N. Praneetha S. Srinivasa Rao Maheswara Rao V V R I. S. Siva Rao P. S. Brahmanandam;
Page : 1327-1336
Keywords : Privacy-preserving cloud computing; Secure Data sharing; Identity-based Hierarchal Cryptographic; Access Control Policy; Secure Authentication;
Abstract
The storage of data with access controllability in sharing data between multiple users in a dispersed environment is now the most pressing issue in cloud computing. Cloud computing's unique feature allows its subscribers to exchange and manage their data with one another safely. However, privacy is essential for all cloud users to communicate freely and openly, as data is accessed by unwanted parties in the cloud. Cloud services have employed numerous security-related techniques for efficient and safe user data exchange. These methods provide efficient, flexible, and reliable access control rules between users when exchanging data. But, they each have advantages and disadvantages concerning key generation and data security. To address the need for adaptable, scalable, and trustworthy access control while exchanging data across a dispersed network, this research proposes a novel access control-based privacy-preserving approach. In terms of cipher text and critical policy security, this method is an extension of attribute-based encryption and the only difference is that with cloud computing, users hierarchically share data, and access control policy amongst shared users is evaluated efficiently. Our method includes sophisticated security features like the revocation of users and access rights of users for outsourced data in the cloud. It also provides scalability and dependability in producing critical structures with dynamic qualities. Experimental results demonstrate that the suggested method improves the current system in terms of cloud data sharing efficiency, scalability, and dependability.
Other Latest Articles
- STRUCTURE BASED DRUG DESIGN METHOD: MOLECULAR DOCKING STUDY ON ANDROGENIC RECEPTOR AND PROSTATE SPECIFIC ANTIGEN WITH POTENTIAL LEAD MOLECULES
- NUMERICAL EXPLORATION OF VISCOUS FLOW REGIMES: INSIGHTS FROM POISEUILLE, COUETTE AND TAYLOR-COUETTE FLOWS
- ON STEREOGRAPHIC SEMICIRCULAR ERLANG DISTRIBUTION WITH APPLICATION
- HYBRID CS-XGBOOST: REVOLUTIONIZING TOMATO DISEASE PREDICTION FOR IMPROVED AGRICULTURAL YIELD AND QUALITY
- ESTIMATING COMMON PARAMETERS OF DIFFERENT CONTINUOUS DISTRIBUTIONS
Last modified: 2024-09-02 03:59:50