SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 725
SECURE MULTI AUTHORITY DATA ACCESS CONTROL SYSTEM IN CLOUD
COMPUTING
GAUTHAM B S, DAYANANDA LAL N
Mr. GAUTHAM B S, MTECH CSE 2nd Year, Acharya Institute of Technology, Bangalore, Karnataka, India.
Mr. DAYANANDA LAL N , Assistant Professor, Dept of CSE , Acharya Institute Of Technology, Bangalore ,Karnataka
,India.
---------------------------------------------------------------------***-------------------------------------------------------
Abstract
Decentralized type storage system especially for procuring the respective data with unidentified type authentication herein
provides more insure type in authentication, user kind annulment and avoids replay type attacks. Access type control is herein
processed on decentralized KDCs or main dispersion types, which are defacto more insure for data kind encryption. Generally,
decentralized KDCs are then grouped by the respective KGC or main generation type. Our system herewith offers authentication
for the respective user, wherein only system type warranted users are efficiently able to consider decrypting, view the respective
stored information. User type affirmations and access type control schemes are herein commenced in decentralized, wherein it is
utilized for avoiding replay type attacks and supports the amendments of respective data being stored in the chosen cloud. The
access type control scheme is gaining more attention since it is quite significant since the users, who have defacto approved the
access to valid type in examination and further the process. Our scheme herein prohibits supports in creation, replay the attacks,
reading and data in modification stored in the respective cloud. We also address user type annulment.
1.INTRODUCTION
Experimentation undertaken in the cloud type
computing is arrived to its best and gained lot of
attention from different areas of the world. Evolution,
adoption of existing type technologies and paradigms
is defacto cloud type computing. Cloud type
computing is primarily where the users do outsource
their computation and considers storing data or
information to the cloud with the means of an
Internet. Cloud type computing offers services for an
instance like office web apps, an appropriate
platform for the respective developers to write forth
the applications as for an instance, we can consider
cloud type sigma, Windows kind Azure, Amazon’s S3,
infrastructures which comprising for an instance
Nimbus and Amazon’s EC2, where these applications
presents cloud type services. Much of the respective
data being stored in cloud like social type networks,
medical kind records can be recognized as the highly
sensitive and requires much of security [6]. Herein,
confidentiality and those of the security are thus
being very critical type issues in the respective cloud
kind computing [7]. Major thing herein is that, user
needs to consider verifying themselves before
making to any transaction and it must be guard that
the respective user does not congruity of the
respective user. The cloud can provide an option for
storage with a different kind of purpose and likewise,
the cloud itself was held liable for the respective
services, which it offers.[3]The integrity of the
respective user, who considers storing the respective
information, can also be certified. The problems of
this type affirmation, access type control,
confidentiality type protection should be herein
solved in a simultaneous manner.[2] BA was
considered by schneier basically to replace standard
of data at encryption.[9] Fundamentally, to provide
flexible and speedy access to cloud for a user without
identity revealing has become the need of time.[13]
2. DISTRIBUTED ACCESS CONTROL
Our basic scheme herein avoids storing multiple type
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 726
encrypted copies of same kind data. KDC or key type
dispersion centers can be considered as addition.
DACC type where there is distributed access type
control kind algorithm, wherein one of the KDC kinds
distributes respective keys to data kind owners and
users. [1]Basically, it provides access to a particular
field in every record, which is being encompassed.
Herein, single type key replaces keys from the
owners. Different set of attributes are allocated to
owners and respective users. Attribute based kind
encryption relied on bilinear type pairings on the
elliptic curves. The whole scheme is collusion type
insure. It supports the annulment of the respective
users without undergoing re-dispersion to every user
of the respective cloud type services. In comparison
to existing type model, there are lesser levels of
communication, computation and storage of various
overheads.
3. FUZZY IDENTITY BASED ENCRYPTION
Identity reliant encryption IBE in fuzzy, we consider
as an identity. A scheme in relevance to this can be
considered for applying basically to enable
encryption utilizing biometric type inputs as
identities. These types are error kind tolerant and it
is insured against the collusion kind attacks. A fuzzy
type IBE kind scheme permits for a private kind of
key especially for the identity, which is measured but
the set being in overlap of distance type metric
basically to decrypt a cipher kind of text.[5]
Access in control of the respective information
especially at the cloud is not defacto decentralized in
nature [12]. All arrangements, which considers in
usage symmetric type key kind strategy does defacto
not reinforce customer in recognizing the evidence.
Earlier work has expressed out the insurance in
sparing the affirmed type access in control in the
respective kind cloud. There is possibility of
Byzantine kind failure, wherein the cloud kind
servers undergo lessened performance, when
considering storage kind server in an arbitrary
manner.
Work herein proposes authority kind basically to
renounce user kind traits with insignificant type
exertion. Cloud type server is basically responsible
for bringing a difficulty from information for
updating and attacks of server in collision. Herein,
stockpiling the servers can be expected, with the
objective that it can amend or adjust the information
of documents; the length of it can be recognized as
uniform type.
Key type dispersion centre is herein considered in
consolidation where a lone KDC defacto scatters a
clandestine type keys and it herein attributes to
every customers, which are found accessible. [4]
Single type KDC is a solitary type reason for bringing
disillusionment, with single type riddle key kind
frustration, a whole of the structure can fall within.
4. IDENTITY BASED AUTHENTICATION
Access type control of respective information in the
corresponding cloud is not defacto decentralized in
nature. Every change, which are defacto usages of
symmetric type strategy and which does not bring in
reinforcement of customer recognizing evidence.
Decentralized way to handle or accessing to
information is relied on framework especially at
cloud. Proprietor can change the pathway type
record. Cloud kind computing is gaining immense
importance [3]
No other client can consider modifying the chosen
document. Cloud type computing is a style in the
respective computing wherein it is considered
dynamically and scalable and common virtualized
type resources are provided as a kind of service,
through an Internet. This particular paper executes
with hierarchical type or HACC. IBE and IBS for HACC
can be said as approved. With the results of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 727
performance kind analysis, we can infer that APCC or
authentication type can be recognized as lightweight
in comparison to SSL type authentication, when
known at the user side. This basically aligns well with
the notion of cloud type computing.
Cloud is herein suspectible for server type colluding
attacks and information in modification. Opponent
can consider compromising storage type servers in
server type scheme attack, hence the student can
amend the data type files though the servers are
homogenous at internally. Encryption of respective
data is basically required for keeping insure of data,
which is being stored.
5. PROPOSED SYSTEM
Provides access in control, which is based on the
respective information. Access type policies for the
respective user will be herein assigned and
authentication in unidentified is provided to the
respective user, who basically wish to store the
insure type data especially on cloud. [14]
Authorizations are provided to the respective users
basically on the basis of key type generation. It
provides access kind policy, which is relied in user
type information. It provides security herein for the
user kind information relying on the respective
attribute which is based on the technique of
encryption. Herein data is insured on the basis of
access type policy and access type control technique
[10]. Security type controls are guarded or counter
type measures are considered to avoid, counteract or
lessen the risk of security which is relating to
personal type. [8] Herein, ABE – Trait type
encryption checks the ability of resolving [11]
Fig 1: Insure Decentralized Access Control Type
6. ANALYSIS AND COMPARISON
We can infer that the decentralized type signifies
better security compared centralized type.
Centraliz
ed/
Decentra
lized
Rea
d/
Wri
te
Acc
ess
Insured
Data
Storage
Types
of
Acces
s
Contr
ol
User
Annul
ment
Centraliz
ed
I-W-
M-R
Not
Authentic
ation
ABE Yes
Decentra
lized
M-
W-
M-R
Not
Authentic
ation
ABE Yes
Decentra
lized
M-
W-
M-R
Authentic
ation
With
digita
l type
signat
ure
Yes
Table 1: Schema Comparative Results
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 728
7. CONCLUSION
Decentralized type frame provides insured kind
information basically stockpiling on the respective
cloud with the unknown kind verification. Decoding
of respective document is defacto permitted just for
the respective framework, which can be said as the
approved or confirmed clients. Our scheme herein
supports in avoidance of replay type attack, in
creation or the amendments whereby viewing the
respective information are exceptionally stored in the
cloud. Accessing the cloud type information for those
of verified type users can be immensely useful. The
whole scheme proposed is more insured.
REFERENCES
[1] H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-Based
Authentication for Cloud Computing,” Proc. First Int’l
Conf. Cloud Computing(CloudCom), pp. 157-166,
2009.
[2] S. Ruj, A. Nayak, and I. Stojmenovic, “DACC:
Distributed access control in clouds,” in IEEE
TrustCom, 2011.I.S. Jacobs and C.P.Bean, “Fine
particles, thin films and exchange anisotropy,” in
Magnetism, vol. III, G.T. Rado and H. Suhl, Eds. New
York:Academic, 1963, pp. 271-350.
[3] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou,
Toward Secure and Dependable Storage Services in
Cloud Compu-ting,_ IEEE Trans.Services Computing,
Apr.- June 2012.
[4] S.Seenu Iropia and R.Vijayalakshmi (2014),
“Decentralized AccessControl of Data Stored in Cloud
using Key-Policy Attribute Based Encryption” in
preceedings:International journal of Inventions in
Computer Science and Engineering ISSN
(print):2348-3431.
[5]Miss.PoojaTandale,Mr.Sidheshwar Khuba
International Journal of Scientific & Engineering
esearch, Volume 6, Issue 4, April-2015 121ISSN 2229-
5518
[6] Vina M. Lomte1 , Harshal Bhosale2 1HOD,
Computer Engineering Department, RMD Sinhgad
School of Engineering, Savitribai Phule University,
Pune, India 2ME student, Computer Engineering
Department, RMD Sinhgad School of Engineering,
Savitribai Phule University, Pune, India
[7] International Journal of Science and Engineering
ApplicationsVolume 5 Issue 2, March-April
2016www.ijsea.com 92 A Survey on Different Techniques
Used in DecentralizedCloud Computing. Mohini Tanaji Patel.
[8] H. K. Maji, M. Prabhakaran, and M. Rosulek,
“Attribute-based signatures: Achieving attribute-
privacy and collusion resistance,”IACR Cryptology
ePrint Archive, 2008
[9] Alabaichi, A. Inf. Technol. Dept., Univ. Utara
Malaysia, Sintok,Malaysia “Security analysis of
blowfish algorithm,” IEEE
[10] F. Zhao, T. Nishide, and K. Sakurai, “Realizing
fine-grained and flexible access control to outsourced
data with attribute-based cryptosystems,” in ISPEC,
ser. Lecture Notes in Computer
Science,vol.6672.Springer,pp.83–97,2011.
[11] Survey on Profile Privacy and Communication
Security in Social Network
Vina M. Lomte, Harshal Bhosale, International Journal
of Science and Research.
[12] G. Wang, Q. Liu, and J. Wu, Hierarchical Attribute-
Based Encryptionfor Fine-Grained Access Control in
Cloud Storage Services, Proc.17th ACM Conf.
Computer and Comm. Secu-rity (CCS), 2010.
[13] Anonymous Authentication of Decentralized
Access Control of Data Stored in Cloud
Swetha Maharajanavar Department of Computer
Science & Engineering, Sri Taralabalu Jagadguru
Institute of Technology, Rannebenur (Karnataka),
India
[14] S Sushmita Ruj, Milos Stojmenovic and Amiya
Nayak,Decentralized Access Control with Anonymous
Authentica-tion of Data Stored in Clouds_, IEEE
Transactions on Parallel and Distributed.

More Related Content

What's hot

Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...iaemedu
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...iaemedu
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsEswar Publications
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concernsMrinal Baowaly
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4sophiabelthome
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computingijcsa
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...IRJET Journal
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...Editor IJCATR
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...IJECEIAES
 

What's hot (16)

Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS Clouds
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concerns
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detectio...
 

Similar to Secure Multi Authority Data Access Control System in Cloud Computing

Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET Journal
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloudeSAT Publishing House
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 

Similar to Secure Multi Authority Data Access Control System in Cloud Computing (20)

Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Paper1
Paper1Paper1
Paper1
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
C04932125
C04932125C04932125
C04932125
 
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 

Secure Multi Authority Data Access Control System in Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 725 SECURE MULTI AUTHORITY DATA ACCESS CONTROL SYSTEM IN CLOUD COMPUTING GAUTHAM B S, DAYANANDA LAL N Mr. GAUTHAM B S, MTECH CSE 2nd Year, Acharya Institute of Technology, Bangalore, Karnataka, India. Mr. DAYANANDA LAL N , Assistant Professor, Dept of CSE , Acharya Institute Of Technology, Bangalore ,Karnataka ,India. ---------------------------------------------------------------------***------------------------------------------------------- Abstract Decentralized type storage system especially for procuring the respective data with unidentified type authentication herein provides more insure type in authentication, user kind annulment and avoids replay type attacks. Access type control is herein processed on decentralized KDCs or main dispersion types, which are defacto more insure for data kind encryption. Generally, decentralized KDCs are then grouped by the respective KGC or main generation type. Our system herewith offers authentication for the respective user, wherein only system type warranted users are efficiently able to consider decrypting, view the respective stored information. User type affirmations and access type control schemes are herein commenced in decentralized, wherein it is utilized for avoiding replay type attacks and supports the amendments of respective data being stored in the chosen cloud. The access type control scheme is gaining more attention since it is quite significant since the users, who have defacto approved the access to valid type in examination and further the process. Our scheme herein prohibits supports in creation, replay the attacks, reading and data in modification stored in the respective cloud. We also address user type annulment. 1.INTRODUCTION Experimentation undertaken in the cloud type computing is arrived to its best and gained lot of attention from different areas of the world. Evolution, adoption of existing type technologies and paradigms is defacto cloud type computing. Cloud type computing is primarily where the users do outsource their computation and considers storing data or information to the cloud with the means of an Internet. Cloud type computing offers services for an instance like office web apps, an appropriate platform for the respective developers to write forth the applications as for an instance, we can consider cloud type sigma, Windows kind Azure, Amazon’s S3, infrastructures which comprising for an instance Nimbus and Amazon’s EC2, where these applications presents cloud type services. Much of the respective data being stored in cloud like social type networks, medical kind records can be recognized as the highly sensitive and requires much of security [6]. Herein, confidentiality and those of the security are thus being very critical type issues in the respective cloud kind computing [7]. Major thing herein is that, user needs to consider verifying themselves before making to any transaction and it must be guard that the respective user does not congruity of the respective user. The cloud can provide an option for storage with a different kind of purpose and likewise, the cloud itself was held liable for the respective services, which it offers.[3]The integrity of the respective user, who considers storing the respective information, can also be certified. The problems of this type affirmation, access type control, confidentiality type protection should be herein solved in a simultaneous manner.[2] BA was considered by schneier basically to replace standard of data at encryption.[9] Fundamentally, to provide flexible and speedy access to cloud for a user without identity revealing has become the need of time.[13] 2. DISTRIBUTED ACCESS CONTROL Our basic scheme herein avoids storing multiple type
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 726 encrypted copies of same kind data. KDC or key type dispersion centers can be considered as addition. DACC type where there is distributed access type control kind algorithm, wherein one of the KDC kinds distributes respective keys to data kind owners and users. [1]Basically, it provides access to a particular field in every record, which is being encompassed. Herein, single type key replaces keys from the owners. Different set of attributes are allocated to owners and respective users. Attribute based kind encryption relied on bilinear type pairings on the elliptic curves. The whole scheme is collusion type insure. It supports the annulment of the respective users without undergoing re-dispersion to every user of the respective cloud type services. In comparison to existing type model, there are lesser levels of communication, computation and storage of various overheads. 3. FUZZY IDENTITY BASED ENCRYPTION Identity reliant encryption IBE in fuzzy, we consider as an identity. A scheme in relevance to this can be considered for applying basically to enable encryption utilizing biometric type inputs as identities. These types are error kind tolerant and it is insured against the collusion kind attacks. A fuzzy type IBE kind scheme permits for a private kind of key especially for the identity, which is measured but the set being in overlap of distance type metric basically to decrypt a cipher kind of text.[5] Access in control of the respective information especially at the cloud is not defacto decentralized in nature [12]. All arrangements, which considers in usage symmetric type key kind strategy does defacto not reinforce customer in recognizing the evidence. Earlier work has expressed out the insurance in sparing the affirmed type access in control in the respective kind cloud. There is possibility of Byzantine kind failure, wherein the cloud kind servers undergo lessened performance, when considering storage kind server in an arbitrary manner. Work herein proposes authority kind basically to renounce user kind traits with insignificant type exertion. Cloud type server is basically responsible for bringing a difficulty from information for updating and attacks of server in collision. Herein, stockpiling the servers can be expected, with the objective that it can amend or adjust the information of documents; the length of it can be recognized as uniform type. Key type dispersion centre is herein considered in consolidation where a lone KDC defacto scatters a clandestine type keys and it herein attributes to every customers, which are found accessible. [4] Single type KDC is a solitary type reason for bringing disillusionment, with single type riddle key kind frustration, a whole of the structure can fall within. 4. IDENTITY BASED AUTHENTICATION Access type control of respective information in the corresponding cloud is not defacto decentralized in nature. Every change, which are defacto usages of symmetric type strategy and which does not bring in reinforcement of customer recognizing evidence. Decentralized way to handle or accessing to information is relied on framework especially at cloud. Proprietor can change the pathway type record. Cloud kind computing is gaining immense importance [3] No other client can consider modifying the chosen document. Cloud type computing is a style in the respective computing wherein it is considered dynamically and scalable and common virtualized type resources are provided as a kind of service, through an Internet. This particular paper executes with hierarchical type or HACC. IBE and IBS for HACC can be said as approved. With the results of
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 727 performance kind analysis, we can infer that APCC or authentication type can be recognized as lightweight in comparison to SSL type authentication, when known at the user side. This basically aligns well with the notion of cloud type computing. Cloud is herein suspectible for server type colluding attacks and information in modification. Opponent can consider compromising storage type servers in server type scheme attack, hence the student can amend the data type files though the servers are homogenous at internally. Encryption of respective data is basically required for keeping insure of data, which is being stored. 5. PROPOSED SYSTEM Provides access in control, which is based on the respective information. Access type policies for the respective user will be herein assigned and authentication in unidentified is provided to the respective user, who basically wish to store the insure type data especially on cloud. [14] Authorizations are provided to the respective users basically on the basis of key type generation. It provides access kind policy, which is relied in user type information. It provides security herein for the user kind information relying on the respective attribute which is based on the technique of encryption. Herein data is insured on the basis of access type policy and access type control technique [10]. Security type controls are guarded or counter type measures are considered to avoid, counteract or lessen the risk of security which is relating to personal type. [8] Herein, ABE – Trait type encryption checks the ability of resolving [11] Fig 1: Insure Decentralized Access Control Type 6. ANALYSIS AND COMPARISON We can infer that the decentralized type signifies better security compared centralized type. Centraliz ed/ Decentra lized Rea d/ Wri te Acc ess Insured Data Storage Types of Acces s Contr ol User Annul ment Centraliz ed I-W- M-R Not Authentic ation ABE Yes Decentra lized M- W- M-R Not Authentic ation ABE Yes Decentra lized M- W- M-R Authentic ation With digita l type signat ure Yes Table 1: Schema Comparative Results
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 728 7. CONCLUSION Decentralized type frame provides insured kind information basically stockpiling on the respective cloud with the unknown kind verification. Decoding of respective document is defacto permitted just for the respective framework, which can be said as the approved or confirmed clients. Our scheme herein supports in avoidance of replay type attack, in creation or the amendments whereby viewing the respective information are exceptionally stored in the cloud. Accessing the cloud type information for those of verified type users can be immensely useful. The whole scheme proposed is more insured. REFERENCES [1] H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-Based Authentication for Cloud Computing,” Proc. First Int’l Conf. Cloud Computing(CloudCom), pp. 157-166, 2009. [2] S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed access control in clouds,” in IEEE TrustCom, 2011.I.S. Jacobs and C.P.Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G.T. Rado and H. Suhl, Eds. New York:Academic, 1963, pp. 271-350. [3] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, Toward Secure and Dependable Storage Services in Cloud Compu-ting,_ IEEE Trans.Services Computing, Apr.- June 2012. [4] S.Seenu Iropia and R.Vijayalakshmi (2014), “Decentralized AccessControl of Data Stored in Cloud using Key-Policy Attribute Based Encryption” in preceedings:International journal of Inventions in Computer Science and Engineering ISSN (print):2348-3431. [5]Miss.PoojaTandale,Mr.Sidheshwar Khuba International Journal of Scientific & Engineering esearch, Volume 6, Issue 4, April-2015 121ISSN 2229- 5518 [6] Vina M. Lomte1 , Harshal Bhosale2 1HOD, Computer Engineering Department, RMD Sinhgad School of Engineering, Savitribai Phule University, Pune, India 2ME student, Computer Engineering Department, RMD Sinhgad School of Engineering, Savitribai Phule University, Pune, India [7] International Journal of Science and Engineering ApplicationsVolume 5 Issue 2, March-April 2016www.ijsea.com 92 A Survey on Different Techniques Used in DecentralizedCloud Computing. Mohini Tanaji Patel. [8] H. K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-based signatures: Achieving attribute- privacy and collusion resistance,”IACR Cryptology ePrint Archive, 2008 [9] Alabaichi, A. Inf. Technol. Dept., Univ. Utara Malaysia, Sintok,Malaysia “Security analysis of blowfish algorithm,” IEEE [10] F. Zhao, T. Nishide, and K. Sakurai, “Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems,” in ISPEC, ser. Lecture Notes in Computer Science,vol.6672.Springer,pp.83–97,2011. [11] Survey on Profile Privacy and Communication Security in Social Network Vina M. Lomte, Harshal Bhosale, International Journal of Science and Research. [12] G. Wang, Q. Liu, and J. Wu, Hierarchical Attribute- Based Encryptionfor Fine-Grained Access Control in Cloud Storage Services, Proc.17th ACM Conf. Computer and Comm. Secu-rity (CCS), 2010. [13] Anonymous Authentication of Decentralized Access Control of Data Stored in Cloud Swetha Maharajanavar Department of Computer Science & Engineering, Sri Taralabalu Jagadguru Institute of Technology, Rannebenur (Karnataka), India [14] S Sushmita Ruj, Milos Stojmenovic and Amiya Nayak,Decentralized Access Control with Anonymous Authentica-tion of Data Stored in Clouds_, IEEE Transactions on Parallel and Distributed.