ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Some Studies on Protection for the Hidden Attribute Based Signatures without Anonymity Revocation

Journal: International Journal of Trend in Scientific Research and Development (Vol.2, No. 6)

Publication Date:

Authors : ;

Page : 585-591

Keywords : Computer Engineering; Cloud; privacy protection; Signatures; Revocation;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The purpose of this paper is to study of access control scheme to protect users privacy in cloud environment is of great significance. In this paper, we present an access control system with privilege separation based on privacy protection. In the PS-ACS scheme, we divide the users into personal domain and public domain logically. In the PSD, we set read and write access permissions for users respectively. The Key-Aggregate Encryption is exploited to implement the read access permission which improves the access efficiency. A high degree of patient privacy is guaranteed simultaneously by exploiting an Improved Attribute-based Signature which can determine the users' write access. For the users of PUD, a hierarchical attribute-based encryption is applied to avoid the issues of single point of failure and complicated key distribution. Function and performance testing result shows that the PS-ACS scheme can achieve privacy protection in cloud based services. S. Mahathi | M. Ravindar "Some Studies on Protection for the Hidden Attribute Based Signatures without Anonymity Revocation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18575.pdf

Last modified: 2018-11-19 19:15:14