SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Science and Engineering Applications
Volume 5 Issue 2, March-April 2016
www.ijsea.com 92
A Survey on Different Techniques Used in Decentralized
Cloud Computing
Mohini Tanaji Patil
B.V.D.U.C.O.E.P.
Katraj,Pune,India
Mohini.patil1@gmail.com
Abstract: This paper proposes various methods for anonymous authentication for data stored in cloud. Cloud verifies the authenticity
of the series without knowing the user’s identity before storing data. This paper also has the added feature of access control in which
only valid users are able to decrypt the stored information. These schemes also prevents replay attacks and supports creation,
modification, and reading data stored in the cloud. Moreover, our authentication and access control scheme is decentralized and robust,
unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage
overheads are comparable to centralized approaches .The aim of this paper is to cover many security issues arises in cloud computing
and different schemes to prevent security risks in cloud. Storage-as-a-service (Saas) offered by cloud service providers (CSPs) is a paid
facility that enables organizations to outsource their sensitive data to be stored on remote servers. In this paper, we propose a cloud-
based storage schemes that allows the data owner to benefit from the facilities offered by the CSP and enables indirect mutual trust
between them. This Paper provides different authentication techniques and algorithms for cloud security.
Keywords: cloud security, auditing,security,ciphertext.
1. INTRODUCTION
In the current era of digital world, various organizations produce
a large amount of sensitive data including personal information,
electronic health records, and financial data. The local
management of such huge amount of data is problematic and
costly due to the requirements of high storage capacity and
qualified personnel. Therefore, storage-as-a-service(Saas)
offered by cloud service providers (CSPs) emerged as a solution
to mitigate the burden of large local data storage and reduce the
maintenance cost by means of outsourcing data storage. Since
the data owner physically releases sensitive data to a remote
CSP, there are some concerns regarding confidentiality,
integrity, and access control of the data. The confidentiality
feature can be guaranteed by the owner via encrypting the data
before outsourcing to remote servers. For verifying data integrity
over cloud servers, researchers have proposed provable data
possession technique to validate the intactness of data stored on
remote sites. A number of PDP protocols have been presented to
efficiently validate the integrity of data. Proof of retrieve ability
was introduced as a stronger technique than PDP in the sense
that the entire data file can be reconstructed from portions of the
data that are reliably stored on the servers. Commonly,
traditional access control techniques assume the existence of the
data owner and the storage servers in the same trust domain.
This assumption, however, no longer holds when the data are
outsourced to a remote CSP, which takes the full charge of the
outsourced data management, and resides outside the trust
domain of the data owner. A feasible solution can be presented
to enable the owner to enforce access control of the data stored
on a remote untrusted CSP. Through this solution, the data are
encrypted under a certain key, which is shared only with the
authorized users. The unauthorized users, including the CSP, are
unable to access the data because they do not have the
decryption key. This general solution has been widely
incorporated into existing schemes, which aim at providing data
storage security on untrusted remote servers. Another class of
solutions utilizes attribute-based encryption to achieve fine-
grained access control.
Different approaches have been investigated that encourage
the owner to outsource the data, and offer some sort of guarantee
related to the confidentiality, integrity, and access control of the
outsourced data. These approaches can prevent and detect
malicious actions from the CSP side. On the other hand, the CSP
needs to be safeguarded from a dishonest owner, who attempts to
get illegal compensations by falsely claiming data corruption
over cloud servers. This concern, if not properly handled, can
cause the CSP to go out of business.
2. CLOUD SECURITY ISSUES AND
CHALLENGES
Cloud computing is a emerging technology with shared
resources, lower cost and rely on pay per use according to the
user demand. Due to many characteristics it has effect on IT
budget and also impact on security, privacy and security issues.
All those CSPs who wish to enjoy this new trend should take
care of these problems. Customer not know where the data are
stored, who manage data and other vulnerabilities that can occur.
Following are some issues that can be faced by CSP while
implementing cloud services.
2.1 Privacy Issues
It is the human right to secure his private and sensitive
information from others. In cloud context privacy occur
according to the cloud deployment model. In Public cloud
(accessed through the Internet and shared amongst different
consumers) is one of the dominant architecture when cost
reduction is concerned, but relying on a CSP to manage and hold
customer information raises many privacy concerns and are
discussed under:
2.2 Lack of user control
In SAAS environment service provider is responsible to control
data. Now how customer can retain its control on data when
information is processed or stored. It is legal requirement of him
and also to make trust between customer and vendor.
2.3 Unauthorized Secondary Usage
One of the threats can occur if information is placed for illegal
uses. Cloud computing standard business model tells that the
service provider can achieve profits from authorized
International Journal of Science and Engineering Applications
Volume 5 Issue 2, March-April 2016
www.ijsea.com 93
Secondary uses of users’ data, mostly the targeting of
commercials. Now days there are no technological barriers for
secondary uses
2.4 Audit
To implement internal monitoring control CSP need external
audit mechanism .But still cloud fails to provide auditing of the
transaction without effecting integrity.
3. DIFFERENT TECHNIQUES USED FOR
DECENTRALIZED ACCESS CONTROL
3.1 Flexible distributed storage integrity auditing mechanism
[1] ensures strong cloud storage. Assurance of cloud data
integrity availability achieved by enforcing quality of cloud
storage service. To achieve data integrity and availability data
may store across multiple physical servers. They support
dynamic data support including block update, delete and append.
Since data do not resides at users’ local site but at cloud service
provider’s address domain. This system is useful for achieving
integration of storage correctness insurance and data error
localization i.e. It is useful for detecting servers that not working
properly. It is highly efficient to malicious data modification
attacks and support third party auditing. It mainly useful for
SaaS cloud platform.
3.2 Identity based authentication [2] is a new identity based
authentication protocol for cloud computing and services.
Identity based encryption (IBE) and identity based signature
(IBS) schemes are useful to achieve security in communication.
Based on IBE and IBS, identity based authentication for cloud
computing (IBACC) is proposed. This protocol is more effective
and lightweight than SAP (SSL Authentication Protocol).It is
more lightweight on user side.
3.3 The act of trust in clouds [3] focuses on cloud
accountability & auditability and gives preventive approaches to
increase accountability. There are many components of trust in
cloud.i.e.security, privacy, accountability, availability. Further
they classified trust component into 2 categories as preventive
control and detective control. They introduces Cloud
Accountability Life Cycle (CALC) CALC consists of 7 phases.
These are policy planning, sense and Trace, Logging, Safe
keeping, reporting and Replaying, Auditing, Optimizing and
Rectifying. According to CALC's phases, it introduces
abstraction layers of accountability in cloud computing i.e.
workflow layer, Data layer, and System layer .This technique is
useful to investigate external risks and risks within CSP
3.4 Mandatory Access Control(MAC)[4] which is used in
secure military applications whereas Discretionary Access
Control(DAC) is used in security processing of industrial and
civilian of government. In many organizations, end user does not
own information for which they allow access so DAC is not
useful. In these case, role based access control is appropriate
which promotes central administration of an organizational
specific security policy. This method gives secure processing
needs of much civilian government organization and more
suitable than DAC (Discretionary Access Control).
3.5 Role based access control with attribute support [5]
dynamic attributes. A pure RBAC solution may provide
inadequate support for dynamic attributes. To support dynamic
attributes, proposed attribute based access control suggests that
attribute and rule either replace RABC or make it more simple
and flexible. They support dynamic attributes.
3.6 Hierarchical Attribute Based Encryption for Fine Grained
Access Control [6] is useful for organizations to efficiently share
confidential data on cloud servers. It supports fine grained access
control and also provides high performance to obtain data. This
scheme achieved goal by combining hierarchical identity based
encryption and ciphertext policy attribute base encryption. There
is 3 levels HABE model. Root Master (RM) is root level model
corresponds to Trusted Third Party (TTP). Multiple Domain
Masters (DMs) that is responsible for multiple enterprise users
and numerous users that correspond to all personnel in
enterprise. This scheme gives high performance and scalability
and support fine grained access control.
3.7 Attribute Based Signature (ABS) [7] not attests to identity
of individual but instead to a claim regarding attributes. ABS is
mainly useful for Attribute Based Messaging as well as in
security and authentication. This ABS scheme supports multiple
authorities and multiple signature trustees who need not trust
each other. This is also centralized approach. This scheme
significantly saves decryption time and provides strong privacy.
3.8 Attribute Based Signature [8] proposes application of ABS
like ABS, ABA. In ABS signature, signature hides attributes
used to satisfy predicate and any identifying information about
signature. This method takes decentralized approach and
provides authentication without disclosing identify of users. This
method is Secure against malicious attribute authority.
3.9 Authorization to encrypt information using ABS for fine
grained access control [9] introduces new cryptosystem called
Key-policy Attribute Based Encryption (KP-ABE). In KP-ABE,
cipher text are labeled With sets of attributes and private keys
are associated with access structures then control which cipher
text to use is able to decrypt. This method distributes audit log
information.
3.10 For realizing complex access control on encrypted data
ciphertext-Policy Attribute Based Encryption [10] is used. By
using this technique encrypted data can be kept confidential even
if storage secure against collusion attacks. In previous systems,
attributes are used to describe encrypted data and built policies
in user’s credentials. This system allows policies to be expressed
as any free access structure and is resistant to collusion attacks.
Encrypted information can be kept confidential even if storage
server is untrusted and also secure against collusion attacks.
3.11 There are several key Distribution Authorities co-
ordinated by a trusted authority, which distribute attributes and
secret keys to users. They propose multiple attribute [11]
authorities monitor different sets of attribute which does not
require no trusted authority. This method allows more numbers
of attributes.
4. DISCUSSION
The different access control approaches in this survey support
both centralized and decentralized approach. In this paper we
compare different access control schemes according to their
access control criteria. For Example, access control mechanism
based on used identity or role, also done through their attributes.
Each of these scheme having their own advantages and
disadvantages, as result can be used to guide selection of an
appropriate approach according to their needs and also find out
key areas for future enhancement. Performance of access control
schemes varies from one mechanism to different. RBAC,ABAC
International Journal of Science and Engineering Applications
Volume 5 Issue 2, March-April 2016
www.ijsea.com 94
having high performance than traditional DAC,MAC whereas
performance of MAC depends on security level. All access
control mechanisms are user convenient
Encryption,” Proc. ACM Conf.Computer and Comm. Security,
pp. 121-130, 2009.
[12] Sushmita Ruj,Milos Stojmenvovic and Amiya Nayak
“Decentralized Access Control Anonymous Authentication
Of Data Stored in Clouds ”IEEE TRANSACTIONS 2014
5. CONCLUSION
This survey presented a decentralized access control
technique with anonymous authentication. This decentralized
scheme provides user revocation and prevents replay attacks.
It provides the load balancing as well as request broker
services which will able to handle multiple cloud storage
providers (CSP). So it will actually improve the performance
of the system because load is shared across the storage service
provider very efficient manner. It will prevent from the many
attack. Even though the cloud does not know the identity of
the user who stores information, but it verifies the user’s
credentials. The main purpose of this paper is to introduce
different access control techniques used in cloud with their
benefits.
6. REFERENCES.
[1] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou,
“Toward Secure and Dependable Storage Services in
Cloud Computing,”IEEE Trans. Services Computing,
vol. 5, no. 2, pp. 220-232, Apr.Junen2012.
[2] H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-Based
Authentication for Cloud Computing,” Proc. First Int’l
Conf. Cloud Computing (CloudCom), pp. 157-166,
2009.
[3] R.K.L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson,
M.Kirchberg, Q. Liang, and B.S. Lee, “Trustcloud: A
Framework for Accountability and Trust in Cloud
Computing,” HP Technical
ReportHPL201138,http://www.hpl.hp.com/techreports/
[4] D.F. Ferraiolo and D.R. Kuhn, “Role-Based Access
Controls,” Proc.15th Nat’l Computer Security Conf.,
1992
[5] D.R. Kuhn, E.J. Coyne, and T.R. Weil, “Adding
Attributes to Role Based Access Control,” IEEE
Computer, vol. 43, no. 6, pp. 79-81,June 2010.
[6] G. Wang, Q. Liu, and J. Wu, “Hierarchical Attribute-
Based Encryption for Fine-Grained Access Control in
Cloud Storage Services,” Proc. 17th ACM Conf.
Computer and Comm. Security (CCS), pp. 735-737,
2010.
[7] H.K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-
Based Signatures: Achieving Attribute-Privacy and
Collusion-Resistance,”IACR Cryptology ePrint Archive,
2008.
[8] H.K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-
Based Signatures,” Topics in Cryptology - CT-RSA, vol.
6558, pp. 376-392,2011.
[9] V. Goyal, O. Pandey, A. Sahai, and B. Waters,
“Attribute-Based Encryption for Fine-Grained Access
Control of Encrypted Data,” Proc. ACM Conf. Computer
and Comm. Security, pp. 89-98, 2006.
[10] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-
Policy Attribute-Based Encryption,” Proc. IEEE Symp.
Security and Privacy, pp. 321-334, 2007.
[11] M. Chase and S.S.M. Chow, “Improving Privacy and
Security in Multi-Authority Attribute-Based

More Related Content

What's hot

A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingIJMER
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
 
Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Editor IJARCET
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...ijsrd.com
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storagesarfraznawaz
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based accessijsptm
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingEnforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingIAEME Publication
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 

What's hot (20)

A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
L04302088092
L04302088092L04302088092
L04302088092
 
Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946
 
H1803035056
H1803035056H1803035056
H1803035056
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storage
 
I42024349
I42024349I42024349
I42024349
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based access
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingEnforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computing
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 

Viewers also liked

Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyModel-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyEditor IJCATR
 
Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...
Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...
Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...Editor IJCATR
 
A Method for Sudanese Vehicle License Plates Detection and Extraction
A Method for Sudanese Vehicle License Plates Detection and ExtractionA Method for Sudanese Vehicle License Plates Detection and Extraction
A Method for Sudanese Vehicle License Plates Detection and ExtractionEditor IJCATR
 
An IT Approach to Improve the Compilation of Clinical Access Indicators and D...
An IT Approach to Improve the Compilation of Clinical Access Indicators and D...An IT Approach to Improve the Compilation of Clinical Access Indicators and D...
An IT Approach to Improve the Compilation of Clinical Access Indicators and D...Editor IJCATR
 
Identifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision TreeIdentifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision TreeEditor IJCATR
 
Exploration and Supremacy of Li-Fi over Wi-Fi
Exploration and Supremacy of Li-Fi over Wi-FiExploration and Supremacy of Li-Fi over Wi-Fi
Exploration and Supremacy of Li-Fi over Wi-FiEditor IJCATR
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based Router Internal Architecture of Junction Based Router
Internal Architecture of Junction Based Router Editor IJCATR
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
Mobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsMobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsEditor IJCATR
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 
Photo-Oxygenation of Trans Anethole
Photo-Oxygenation of Trans AnetholePhoto-Oxygenation of Trans Anethole
Photo-Oxygenation of Trans AnetholeEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 
Analytical Comparison of Mathematical Modeling in the Diagnostic Expert Systems
Analytical Comparison of Mathematical Modeling in the Diagnostic Expert SystemsAnalytical Comparison of Mathematical Modeling in the Diagnostic Expert Systems
Analytical Comparison of Mathematical Modeling in the Diagnostic Expert SystemsEditor IJCATR
 
Significant Role of Statistics in Computational Sciences
Significant Role of Statistics in Computational SciencesSignificant Role of Statistics in Computational Sciences
Significant Role of Statistics in Computational SciencesEditor IJCATR
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudEditor IJCATR
 

Viewers also liked (17)

Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyModel-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
 
Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...
Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...
Influence of Ion Beam and Carbon Black Filler Type on the Mechanical and Phys...
 
Ijcatr04061009
Ijcatr04061009Ijcatr04061009
Ijcatr04061009
 
A Method for Sudanese Vehicle License Plates Detection and Extraction
A Method for Sudanese Vehicle License Plates Detection and ExtractionA Method for Sudanese Vehicle License Plates Detection and Extraction
A Method for Sudanese Vehicle License Plates Detection and Extraction
 
An IT Approach to Improve the Compilation of Clinical Access Indicators and D...
An IT Approach to Improve the Compilation of Clinical Access Indicators and D...An IT Approach to Improve the Compilation of Clinical Access Indicators and D...
An IT Approach to Improve the Compilation of Clinical Access Indicators and D...
 
Identifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision TreeIdentifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision Tree
 
Exploration and Supremacy of Li-Fi over Wi-Fi
Exploration and Supremacy of Li-Fi over Wi-FiExploration and Supremacy of Li-Fi over Wi-Fi
Exploration and Supremacy of Li-Fi over Wi-Fi
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based Router Internal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
Mobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsMobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google Maps
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
Photo-Oxygenation of Trans Anethole
Photo-Oxygenation of Trans AnetholePhoto-Oxygenation of Trans Anethole
Photo-Oxygenation of Trans Anethole
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
Analytical Comparison of Mathematical Modeling in the Diagnostic Expert Systems
Analytical Comparison of Mathematical Modeling in the Diagnostic Expert SystemsAnalytical Comparison of Mathematical Modeling in the Diagnostic Expert Systems
Analytical Comparison of Mathematical Modeling in the Diagnostic Expert Systems
 
Significant Role of Statistics in Computational Sciences
Significant Role of Statistics in Computational SciencesSignificant Role of Statistics in Computational Sciences
Significant Role of Statistics in Computational Sciences
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the Cloud
 

Similar to A Survey on Different Techniques Used in Decentralized Cloud Computing

Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityPratik Sharma
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based dataASAITHAMBIRAJAA
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based datahemanthbbc
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET Journal
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 

Similar to A Survey on Different Techniques Used in Decentralized Cloud Computing (20)

Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
Ieeepro techno solutions   2011 ieee dotnet project -secure role based dataIeeepro techno solutions   2011 ieee dotnet project -secure role based data
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
 
V04405122126
V04405122126V04405122126
V04405122126
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 

More from Editor IJCATR

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineEditor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in EducationEditor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
 

More from Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Recently uploaded

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

A Survey on Different Techniques Used in Decentralized Cloud Computing

  • 1. International Journal of Science and Engineering Applications Volume 5 Issue 2, March-April 2016 www.ijsea.com 92 A Survey on Different Techniques Used in Decentralized Cloud Computing Mohini Tanaji Patil B.V.D.U.C.O.E.P. Katraj,Pune,India Mohini.patil1@gmail.com Abstract: This paper proposes various methods for anonymous authentication for data stored in cloud. Cloud verifies the authenticity of the series without knowing the user’s identity before storing data. This paper also has the added feature of access control in which only valid users are able to decrypt the stored information. These schemes also prevents replay attacks and supports creation, modification, and reading data stored in the cloud. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches .The aim of this paper is to cover many security issues arises in cloud computing and different schemes to prevent security risks in cloud. Storage-as-a-service (Saas) offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their sensitive data to be stored on remote servers. In this paper, we propose a cloud- based storage schemes that allows the data owner to benefit from the facilities offered by the CSP and enables indirect mutual trust between them. This Paper provides different authentication techniques and algorithms for cloud security. Keywords: cloud security, auditing,security,ciphertext. 1. INTRODUCTION In the current era of digital world, various organizations produce a large amount of sensitive data including personal information, electronic health records, and financial data. The local management of such huge amount of data is problematic and costly due to the requirements of high storage capacity and qualified personnel. Therefore, storage-as-a-service(Saas) offered by cloud service providers (CSPs) emerged as a solution to mitigate the burden of large local data storage and reduce the maintenance cost by means of outsourcing data storage. Since the data owner physically releases sensitive data to a remote CSP, there are some concerns regarding confidentiality, integrity, and access control of the data. The confidentiality feature can be guaranteed by the owner via encrypting the data before outsourcing to remote servers. For verifying data integrity over cloud servers, researchers have proposed provable data possession technique to validate the intactness of data stored on remote sites. A number of PDP protocols have been presented to efficiently validate the integrity of data. Proof of retrieve ability was introduced as a stronger technique than PDP in the sense that the entire data file can be reconstructed from portions of the data that are reliably stored on the servers. Commonly, traditional access control techniques assume the existence of the data owner and the storage servers in the same trust domain. This assumption, however, no longer holds when the data are outsourced to a remote CSP, which takes the full charge of the outsourced data management, and resides outside the trust domain of the data owner. A feasible solution can be presented to enable the owner to enforce access control of the data stored on a remote untrusted CSP. Through this solution, the data are encrypted under a certain key, which is shared only with the authorized users. The unauthorized users, including the CSP, are unable to access the data because they do not have the decryption key. This general solution has been widely incorporated into existing schemes, which aim at providing data storage security on untrusted remote servers. Another class of solutions utilizes attribute-based encryption to achieve fine- grained access control. Different approaches have been investigated that encourage the owner to outsource the data, and offer some sort of guarantee related to the confidentiality, integrity, and access control of the outsourced data. These approaches can prevent and detect malicious actions from the CSP side. On the other hand, the CSP needs to be safeguarded from a dishonest owner, who attempts to get illegal compensations by falsely claiming data corruption over cloud servers. This concern, if not properly handled, can cause the CSP to go out of business. 2. CLOUD SECURITY ISSUES AND CHALLENGES Cloud computing is a emerging technology with shared resources, lower cost and rely on pay per use according to the user demand. Due to many characteristics it has effect on IT budget and also impact on security, privacy and security issues. All those CSPs who wish to enjoy this new trend should take care of these problems. Customer not know where the data are stored, who manage data and other vulnerabilities that can occur. Following are some issues that can be faced by CSP while implementing cloud services. 2.1 Privacy Issues It is the human right to secure his private and sensitive information from others. In cloud context privacy occur according to the cloud deployment model. In Public cloud (accessed through the Internet and shared amongst different consumers) is one of the dominant architecture when cost reduction is concerned, but relying on a CSP to manage and hold customer information raises many privacy concerns and are discussed under: 2.2 Lack of user control In SAAS environment service provider is responsible to control data. Now how customer can retain its control on data when information is processed or stored. It is legal requirement of him and also to make trust between customer and vendor. 2.3 Unauthorized Secondary Usage One of the threats can occur if information is placed for illegal uses. Cloud computing standard business model tells that the service provider can achieve profits from authorized
  • 2. International Journal of Science and Engineering Applications Volume 5 Issue 2, March-April 2016 www.ijsea.com 93 Secondary uses of users’ data, mostly the targeting of commercials. Now days there are no technological barriers for secondary uses 2.4 Audit To implement internal monitoring control CSP need external audit mechanism .But still cloud fails to provide auditing of the transaction without effecting integrity. 3. DIFFERENT TECHNIQUES USED FOR DECENTRALIZED ACCESS CONTROL 3.1 Flexible distributed storage integrity auditing mechanism [1] ensures strong cloud storage. Assurance of cloud data integrity availability achieved by enforcing quality of cloud storage service. To achieve data integrity and availability data may store across multiple physical servers. They support dynamic data support including block update, delete and append. Since data do not resides at users’ local site but at cloud service provider’s address domain. This system is useful for achieving integration of storage correctness insurance and data error localization i.e. It is useful for detecting servers that not working properly. It is highly efficient to malicious data modification attacks and support third party auditing. It mainly useful for SaaS cloud platform. 3.2 Identity based authentication [2] is a new identity based authentication protocol for cloud computing and services. Identity based encryption (IBE) and identity based signature (IBS) schemes are useful to achieve security in communication. Based on IBE and IBS, identity based authentication for cloud computing (IBACC) is proposed. This protocol is more effective and lightweight than SAP (SSL Authentication Protocol).It is more lightweight on user side. 3.3 The act of trust in clouds [3] focuses on cloud accountability & auditability and gives preventive approaches to increase accountability. There are many components of trust in cloud.i.e.security, privacy, accountability, availability. Further they classified trust component into 2 categories as preventive control and detective control. They introduces Cloud Accountability Life Cycle (CALC) CALC consists of 7 phases. These are policy planning, sense and Trace, Logging, Safe keeping, reporting and Replaying, Auditing, Optimizing and Rectifying. According to CALC's phases, it introduces abstraction layers of accountability in cloud computing i.e. workflow layer, Data layer, and System layer .This technique is useful to investigate external risks and risks within CSP 3.4 Mandatory Access Control(MAC)[4] which is used in secure military applications whereas Discretionary Access Control(DAC) is used in security processing of industrial and civilian of government. In many organizations, end user does not own information for which they allow access so DAC is not useful. In these case, role based access control is appropriate which promotes central administration of an organizational specific security policy. This method gives secure processing needs of much civilian government organization and more suitable than DAC (Discretionary Access Control). 3.5 Role based access control with attribute support [5] dynamic attributes. A pure RBAC solution may provide inadequate support for dynamic attributes. To support dynamic attributes, proposed attribute based access control suggests that attribute and rule either replace RABC or make it more simple and flexible. They support dynamic attributes. 3.6 Hierarchical Attribute Based Encryption for Fine Grained Access Control [6] is useful for organizations to efficiently share confidential data on cloud servers. It supports fine grained access control and also provides high performance to obtain data. This scheme achieved goal by combining hierarchical identity based encryption and ciphertext policy attribute base encryption. There is 3 levels HABE model. Root Master (RM) is root level model corresponds to Trusted Third Party (TTP). Multiple Domain Masters (DMs) that is responsible for multiple enterprise users and numerous users that correspond to all personnel in enterprise. This scheme gives high performance and scalability and support fine grained access control. 3.7 Attribute Based Signature (ABS) [7] not attests to identity of individual but instead to a claim regarding attributes. ABS is mainly useful for Attribute Based Messaging as well as in security and authentication. This ABS scheme supports multiple authorities and multiple signature trustees who need not trust each other. This is also centralized approach. This scheme significantly saves decryption time and provides strong privacy. 3.8 Attribute Based Signature [8] proposes application of ABS like ABS, ABA. In ABS signature, signature hides attributes used to satisfy predicate and any identifying information about signature. This method takes decentralized approach and provides authentication without disclosing identify of users. This method is Secure against malicious attribute authority. 3.9 Authorization to encrypt information using ABS for fine grained access control [9] introduces new cryptosystem called Key-policy Attribute Based Encryption (KP-ABE). In KP-ABE, cipher text are labeled With sets of attributes and private keys are associated with access structures then control which cipher text to use is able to decrypt. This method distributes audit log information. 3.10 For realizing complex access control on encrypted data ciphertext-Policy Attribute Based Encryption [10] is used. By using this technique encrypted data can be kept confidential even if storage secure against collusion attacks. In previous systems, attributes are used to describe encrypted data and built policies in user’s credentials. This system allows policies to be expressed as any free access structure and is resistant to collusion attacks. Encrypted information can be kept confidential even if storage server is untrusted and also secure against collusion attacks. 3.11 There are several key Distribution Authorities co- ordinated by a trusted authority, which distribute attributes and secret keys to users. They propose multiple attribute [11] authorities monitor different sets of attribute which does not require no trusted authority. This method allows more numbers of attributes. 4. DISCUSSION The different access control approaches in this survey support both centralized and decentralized approach. In this paper we compare different access control schemes according to their access control criteria. For Example, access control mechanism based on used identity or role, also done through their attributes. Each of these scheme having their own advantages and disadvantages, as result can be used to guide selection of an appropriate approach according to their needs and also find out key areas for future enhancement. Performance of access control schemes varies from one mechanism to different. RBAC,ABAC
  • 3. International Journal of Science and Engineering Applications Volume 5 Issue 2, March-April 2016 www.ijsea.com 94 having high performance than traditional DAC,MAC whereas performance of MAC depends on security level. All access control mechanisms are user convenient Encryption,” Proc. ACM Conf.Computer and Comm. Security, pp. 121-130, 2009. [12] Sushmita Ruj,Milos Stojmenvovic and Amiya Nayak “Decentralized Access Control Anonymous Authentication Of Data Stored in Clouds ”IEEE TRANSACTIONS 2014 5. CONCLUSION This survey presented a decentralized access control technique with anonymous authentication. This decentralized scheme provides user revocation and prevents replay attacks. It provides the load balancing as well as request broker services which will able to handle multiple cloud storage providers (CSP). So it will actually improve the performance of the system because load is shared across the storage service provider very efficient manner. It will prevent from the many attack. Even though the cloud does not know the identity of the user who stores information, but it verifies the user’s credentials. The main purpose of this paper is to introduce different access control techniques used in cloud with their benefits. 6. REFERENCES. [1] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,”IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.Junen2012. [2] H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-Based Authentication for Cloud Computing,” Proc. First Int’l Conf. Cloud Computing (CloudCom), pp. 157-166, 2009. [3] R.K.L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M.Kirchberg, Q. Liang, and B.S. Lee, “Trustcloud: A Framework for Accountability and Trust in Cloud Computing,” HP Technical ReportHPL201138,http://www.hpl.hp.com/techreports/ [4] D.F. Ferraiolo and D.R. Kuhn, “Role-Based Access Controls,” Proc.15th Nat’l Computer Security Conf., 1992 [5] D.R. Kuhn, E.J. Coyne, and T.R. Weil, “Adding Attributes to Role Based Access Control,” IEEE Computer, vol. 43, no. 6, pp. 79-81,June 2010. [6] G. Wang, Q. Liu, and J. Wu, “Hierarchical Attribute- Based Encryption for Fine-Grained Access Control in Cloud Storage Services,” Proc. 17th ACM Conf. Computer and Comm. Security (CCS), pp. 735-737, 2010. [7] H.K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute- Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance,”IACR Cryptology ePrint Archive, 2008. [8] H.K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute- Based Signatures,” Topics in Cryptology - CT-RSA, vol. 6558, pp. 376-392,2011. [9] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” Proc. ACM Conf. Computer and Comm. Security, pp. 89-98, 2006. [10] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext- Policy Attribute-Based Encryption,” Proc. IEEE Symp. Security and Privacy, pp. 321-334, 2007. [11] M. Chase and S.S.M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based