SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1154
Two Aspect Endorsement Access Control for web Based Cloud
Computing
S.Prema1, S.Raju2, S.Rajeshwari3
1Dr.S.Prem, ASP of IT, Mahendra Engineering College, Namakkal, Tamil Nadu, India
2Prof.S.Raju, HOD of IT, Mahendra Engineering College, Namakkal, Tamil Nadu, India
3Mrs.S.Rajeshwari, AP of IT, Mahendra Engineering College, Namakkal, Tamil Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - A brand new fine-grained two-factor
authentication (2FA) access system for web-based cloud
computing services. Specifically, in our planned 2FAaccess
system, AN attribute based access management mechanism is
enforced with the need of each user secret key and a light-
weight security device. As a user cannot access the system if
she/he doesn’t hold each, the mechanism will enhance the
protection of the system, particularly in those situations
wherever several users share constant laptop for web based
cloud services. Additionally, attribute based management
within the system additionally allows the cloud server to limit
the access to those users with constant set of attributes
whereas conserving user privacy, i.e., the cloud server solely is
aware of that the user fulfills the specified predicate, however
has no plan on the precise identity of the user. Finally a
tendency to perform simulation to demonstrate the utility of
our planned 2FA system. Introduce the Object-sensitive RBAC
(ORBAC), a generalized RBAC model for object-oriented
languages. ORBAC resolves the quality limitations of RBAC by
permitting roles to be parameterized by properties of the
business objects being manipulated. Tend to formalize
associated prove sound a dependentsortsystemthatstatically
validates a program’s agreement to an ORBAC policy. Oursort
system for Java and have used it to validate fine-grained
access management within the Open MRS medical records
system.
Keywords— Two factor authentication, ORBAC model,
Cloud server, business objects, access management
system
1. INTRODUCTION
In present position Cloud computing may be a effective
host computing system that permits enterprises to shop for,
lease, sell, or distribute software package connected
dissimilar digital resources in excess of the net as an on-
demand service. It not depends on a server or diversity of
machines that actually exist, because it may be a practical
system. There is a component several application of cloud
computing, like in rank sharing in format ion storage huge
information organization medical system etc. Finish user’s
admittance cloud-based applications through an internet
browser, skinny shopper or mobile app whereas the
business software package and user’s information area unit
hold on servers at a far off location.
The compensation of web-based cloud computing
services area unit giant, that grip the convenience of
openness, reduced prices and wealth expenditures,
hyperbolic operational efficiencies, measurability,flexibility
and direct time to promote. Although the new standard of
cloud computing provides nice blessings, there square
measure in the meantime conjointly considerations
concerning security and privacy particularly for internet
primarily based cloud services.
As sensitive information could also be keep within
the cloud for sharing purpose or convenient access; and
eligible users may additionally access the cloud system for
numerous applications and services,userauthentication has
become a vital element for any cloud system. A client is
required to login previous to victimizationthecloudservices
or accessing the responsive information keeps within the
cloud. There open area evaluate two issues for the classic
report code word based system First, the classic statement
code word based confirmation isn't confidentiality-
preserving. However, its sound known that privacy is an
extremely vital feature that has to be observing about in
cloud computing systems. Second, it's widespread to
contribute to a laptop surrounded by completely dissimilar
persons. It should be simple for hackers to put in some
spyware to find out the login word from the web-browser. A
newly designed way in running replica known as attribute-
based entrée management could be a stylish candidate to
begin the primary problem. It is not exclusively provides
unidentified authentication however in additionanydefines
right of entry management policies supported entirely
dissimilar attributes of the requester, environment,orthein
sequence object. In AN attribute-based access management
system, each user encompasses a user top secret key issued
by the ability. In follow, the user secret is hold on inside the
non-public laptop. After think abouttheontopofmentioned
second disadvantage on web-based services, it’s common
that computers could also be mutual by more than a few
users mainly in some huge enterprises or organizations.
2. EXISTING SYSTEM
Permit the assaulter to specify the protection device for
revocation. If a security device token is revoked, oracle can
now not be out there. Tend to more assume the claim-
predicate is chosen by the assaulter. Associate assaulter is
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1155
claimed to breach the protection demand of authentication,
access while not security device or access while not secret
key if it will demonstrate with success for the predicateiffor
all specified it's controlled by the assaulter, unless the token
has been revoked. The last condition is to capture true that
the protection device is employed as a mechanism to revoke
a user. A user UN agency is in possession of a security device
shouldn't be ready to demonstrate anylonger whenit'sbeen
revoked. Regarding the protection of our theme, the
subsequent lemma. If there exists associate assaulter F
against our theme, there exists a machineS,havingblack box
access to F, that may existentially forge a BBS+ signature or
the beg signature below the adjectivechosenmessageattack
or finding the distinct log downside. Within the following
tend to prove constructing the machine S below the belief
that assaulter F exists. Tend to use the actual fact that area
unit zero knowledge proof-of-knowledge protocols.
3. PROPOSED SYSTEM
Permit the assaulter to specify the protection device for
revocation. If a security device token is revoked, oracle can
now not be out there. Tend to more assume the claim-
predicate is chosen by the assaulter. associate assaulter is
claimed to breach the protection demand of authentication,
access while not security device or access while not secret
key if it can manifest with success for the predicate if for all
specified it's controlled bytheassaulter,unlessthetoken has
been revoked. The last condition is to capture the case that
the protection device is employed as a mechanism to revoke
a user. A user World Health Organization is in possession of
a security device mustn’t be able to manifest any longer
when it's been revoked. Regarding the protection of out
theme, the subsequent lemma. If there exists associate
assaulter F against our theme, there exists a machine S,
having black box access to F, which will existentially forge a
BBS+ signature or the cadge signature below the adaptation
chosen message attack or resolution the separate log
downside. Within the following tendency to prove
constructing the machine S below the belief that assaulter
Fexists. A tendency to employ the very fact that zero
knowledge proof-of-knowledge protocols. In alternative
words, there exist information extractors which will extract
the underlying witnesses of the corresponding protocols.
Fig -1: System Architecture
3.1 Authentication
The soul tries to access the system on the far side its
privileges. as an example, a user with attributes student;
Physics might try and access the system with policy “Staff”
AND “Physics”. To do so, he might interact with alternative
users.
3.2Access whiles no Security Device
The soul tries to access the system (within its privileges)
while not the protection device, or victimization security
device happiness to others.
3.3Access while not Secret Key
The soul tries to access the system(withinitsprivileges)with
none secret key. It will have its own security device.
3.4Privacy
The soul acts because the role of the cloud server and tries to
search out the identity of the user it's interacting with.
4. FUTURE ENHANCEMENT
4.1Construction of the Meta information
Information is information concerning information. Two
sorts of information exist: Structural information and
descriptive information. Structural information is
information concerning the containers of knowledge.
Descriptive information uses individual instances of
application information or the info content. Metadata was
historically within the card catalogs of libraries. As info has
become progressively digital, information is additionally
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1156
wont to describe digital information victimization
information standards specific to a selected discipline.
Describing the contents and context {of information |of
knowledge| of information} or data files will increase their
quality. as an example, an internet page might embody
information specifying what language the page is written in,
what tools were wont to produce it, and wherever to search
out additional info concerning the subject; this information
will mechanically improve the reader's expertise. The main
purpose of information is to facilitate within the discovery of
relevant info, additional classified as resource discovery.
Metadata conjointlyhelpsorganizeelectronicresources,give
digital identification, and helps support archiving and
preservation of the resource. Information assists in resource
discovery by permitting resources to be found by relevant
criteria, distinctiveresources,transferrablesimilarresources
along, distinctive dissimilar resources, and giving location
data. Descriptive information is often used for discovery and
identification, as data want to search associate degreed find
an object like title,author, subjects, keywords,andpublisher.
Structural information offersan outline of however theparts
of associate degree object organized. Associate degree
example of structural information would be however pages
ordered to makechaptersofabook.Finally,bodyinformation
offers data to assist manage the supply. It refers to the
technical data together with file sort or once and the way
the file was created. Two subtypes ofbodyinformationrights
management information and preservation information.
Rights management information justifies belongings rights,
where as preservation information contains data that’s
required to preserve and save a resource.
4.2Creating an Index Tree
Index tree may be a self-balancing tree system that keeps
information sorted and permits searches, ordered access,
insertions, and deletions in exponent time. It's a
generalization of a binary search tree in this a node will have
over two youngsters. In contrast to self-balancing binary
search trees, the index-tree is optimized for systems that
browse and writemassive blocks of information. Index-trees
AR an honest example of information structure for external
memory.it'sordinarilyutilizedindatabasesandclassification
system. Index-trees have substantial blessings over various
implementations once thetimetoaccess{theinformationthe
info |the information} of a node greatly exceeds the time
spent process that data, as a result of then the price of
accessing the node is also amortized over multiple
Operations inside the node. This typically happens once the
node information AR in memory device like disk drives. By
increasing theamount of keys insideevery internal node,the
peak of the tree decreases and therefore the range of costly
nodeaccessesisreduced.Additionally,rebalancingofthetree
happens less typically.
The utmost range kid |of kid} nodes depend on the data that
has got to be keep for every child node and therefore the size
of a full disk block or a similar size in memory device.
Rebalancing starts from a leaf and payoff toward the
foundation till the tree is balanced. If deleting a part from a
node has brought it beneath the minimum size, then some
components should be decentralized to bring all nodes up to
the minimum. Usually, the distribution involves moving a
part from a sib node that has over the minimum range of
nodes. That distribution operation is term rotation. If no sib
will spare a part, then the deficient nodeshouldbeintegrated
with a sib.
The merge causes the parentto lose an extractorcomponent;
therefore the parent might become deficient and want
rebalancing. The merging and rebalancing mightcontinueall
the thanks to the foundation.Since the minimum component
count does not apply to the foundation, creating the
foundation is the sole deficient node isn't a retardant.
4.3 Authentication of the Users
Authentication of the users with passwords AR in all
probability the foremost customary means that users affirm
their identities so that they AR ready to be granted entry to a
given procedure. However, passwords also are regarded a
vulnerable form of authentication, therefore replacement or
complementary strategies are becoming wont to verify the
identity of the user. Most applications have to be compelled
to understand the identityofauser.Knowingauser'sidentity
permits associate degree app to supply a bespoke expertise
and grant them permissions to access their information. The
process of proving a user'sidentityistermedauthentication.
To safeguard privacy, all information collected AR hashed
with a random key at the time of assortment. This secret's
device-specific, generated and keep on the device, and ne'er
exported. The system cannot infer the particularinformation
from the hashed information,nor will it take alookatabit{of
information| of knowledge| of information} to examine if it
agrees with the initial data. During this means, the system
balances security and privacy. The server exposes two
internet service interfaces: report and question. There port
interface permits consumer aspect agents to report context
and activity information routinely; the question interface
permits alternative entities (e.g., the authentication engine)
to urge a score for a tool that indicates however traditional
the behavior of the device isat the instant.Thescoredepends
on current knowledge and a machine-learned model of the
devices past behavior, supported a window of knowledge
collected within the past.Thewindowdoesn'textendtooway
within the past, in order that recent behavior is additional
vital than behavior within the way past.
4.4Data Encryption and Retrieval
Tend to build use of algorithmic coding to firmly encipher
{the knowledge| the info| the information} in multiple parts
into separate knowledge and Meta data sets that eases the
search phase and ranking phases from the time intense task
of secret writing and avoids the privacy problems analogous
to the encrypted storage paradigm. By creating use of coding
algorithmicallytheinfonamelessnessisachievedandalsothe
use of recursive coding offloads the task of secret writing
from the search logic. This can be more formed to rank the
things in keeping with the Meta knowledge such and at any
purpose of the Meta knowledge solely has to be best-known
for the ranking method and doesn't would like the total
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1157
payload to be decrypted which improves the search
performance and the privacy protection.
5. CONCLUSIONS
A novel fine-grained two-factor authentication (2FA) access
system for web-based cloudcomputingservices. Exclusively,
in our proposed 2FAaccess system, AN attribute- basedright
to use management method is imposed with the require of
each user secret key and a light-weight security device. As a
user cannot access the system if she/he doesn't hold each,
the method will improve the safety of thesystem, principally
in those situations wherever numerous users allocatestable
laptop for web- based cloud services. Moreover, attribute-
based managementwithinthesystemadditionallyallowsthe
cloud server to limit the access to those users with stable
set attributes here as conserving user privacy, i.e., the cloud
server solely is aware of that the user fulfills the specified
predicate, however has no plan on the precise identity of
the user.
REFERENCES
[1] M. H. Au and A. Kapadia, “PERM: Practical reputation-
based blacklisting withoutTTPS,”inProc.ACMConf.Comput.
Commun. Secur. (CCS), Raleigh,NC, USA, Oct. 2012, pp. 929–
940.
[2] M. H. Au, A. Kapadia, and W. Susilo, “BLACR:TTP-free
blacklistable anonymous credentials with reputation,” in
Proc. 19th NDSS, 2012, pp. 1–17.
[3] M. H. Au, W. Susilo, and Y. Mu, “Constant-size dynamic k-
TAA,” in Proc. 5th Int. Conf. SCN, 2006, pp.111–125.
[4] J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang, “A secure
cloud computing based framework for big data information
management of smart grid,” IEEE Trans.Cloud Comput., vol.
3, no. 2, pp. 233–244, Apr./Jun.2015.
[5] M. Bellare and O. Goldreich, “On defining proofs of
knowledge,” in Proc. 12th Annu. Int. CRYPTO, 1992, pp.390–
420.
[6] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertextpolicy
attributebased encryption,” in Proc. IEEE Symp. Secur.
Privacy, May 2007, pp. 321–334.
[7] D. Boneh, X. Boyen, and H. Shacham, “Short group
signatures,” in Advances in Cryptology. Berlin, Germany:
Springer-Verlag, 2004, pp. 41–55.
[8] D. Boneh, X. Ding, and G. Tsudik, “Fine-grained control of
security capabilities,” ACM Trans. Internet Technol., vol. 4,
no. 1, pp. 60–82, 2004.
[9] J. Camenisch, “Group signature schemes and payment
systems based on the discrete logarithm problem,” Ph.D.
dissertation, ETH Zurich, Zürich,Switzerland, 1998.
[10] J. Camenisch, M. Dubovitskaya, and G. Neven,“Oblivious
transfer with access control,” in Proc. 16th ACM Conf.
Comput. Commun. Secur. (CCS), Chicago,IL, USA, Nov. 2009,
pp. 131–140.
[11] J. Camenisch and A. Lysyanskaya, “A signature scheme
with efficient protocols,” in Proc. 3rd Int. Conf.Secur.
Commun. Netw. (SCN), Amalfi, Italy, Sep. 2002,pp. 268–289.
[12] J. Camenisch and A. Lysyanskaya, “Signature schemes
and anonymous credentials from bilinear maps,” in
Advances in Cryptology. Berlin, Germany:Springer-Verlag,
2004, pp. 56–72.
[13] Y. Chen, Z. L. Jiang, S. M. Yiu, J. K. Liu, M. H. Au,and X.
Wang, “Fully secure ciphertext-policy attribute based
encryption with security mediator,” in Proc.ICICS, 2014, pp.
274–289.
[14] S. S. M. Chow, C. Boyd, and J. M. G. Nieto ,“Security-
mediated certificateless cryptography,” in Public Key
Cryptography (Lecture Notes in Computer Science), vol.
3958. Berlin, Germany: Springer-Verlag, 2006, pp. 508–524.
[15] C.-K. Chu, W.-T. Zhu, J. Han, J.-K. Liu, J. Xu, and J. Zhou,
“Security concerns in popular cloud storage services,” IEEE
Pervasive Comput., vol. 12, no. 4, pp. 50–57, Oct./Dec. 2013.

More Related Content

What's hot

Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Martin Ruubel
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Editor IJMTER
 
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesImage-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesConfident Technologies
 
Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkSalam Shah
 
u10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacobu10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji JacobBeji Jacob
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideEntrust Datacard
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Martin Ruubel
 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure loginIRJET Journal
 
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...journal ijrtem
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalCMR WORLD TECH
 
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsData Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsMelissa Lim
 
Darktrace Proof of Value
Darktrace Proof of ValueDarktrace Proof of Value
Darktrace Proof of ValueDarktrace
 
finalreportsoarnew (1).pdf
finalreportsoarnew (1).pdffinalreportsoarnew (1).pdf
finalreportsoarnew (1).pdfFirozkumar2
 

What's hot (18)

Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesImage-Based Authentication from Confident Technologies
Image-Based Authentication from Confident Technologies
 
Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud network
 
u10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacobu10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacob
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
 
Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...Combating the enemy within – an elegant mathematical approach to insider thre...
Combating the enemy within – an elegant mathematical approach to insider thre...
 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure login
 
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
Requirement Based Intrusion Detection in Addition to Prevention Via Advanced ...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
 
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsData Sheet_What Darktrace Finds
Data Sheet_What Darktrace Finds
 
Darktrace Proof of Value
Darktrace Proof of ValueDarktrace Proof of Value
Darktrace Proof of Value
 
Antigena Overview
Antigena OverviewAntigena Overview
Antigena Overview
 
firozreport.pdf
firozreport.pdffirozreport.pdf
firozreport.pdf
 
finalreportsoarnew (1).pdf
finalreportsoarnew (1).pdffinalreportsoarnew (1).pdf
finalreportsoarnew (1).pdf
 

Similar to Two Aspect Endorsement Access Control for web Based Cloud Computing

IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Controljwpiccininni
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldIdentive
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSIRJET Journal
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Brianna Johnson
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloudImplementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloudAjit Bhingarkar
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...IRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxlmelaine
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 

Similar to Two Aspect Endorsement Access Control for web Based Cloud Computing (20)

IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
I42024349
I42024349I42024349
I42024349
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloudImplementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 

Two Aspect Endorsement Access Control for web Based Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1154 Two Aspect Endorsement Access Control for web Based Cloud Computing S.Prema1, S.Raju2, S.Rajeshwari3 1Dr.S.Prem, ASP of IT, Mahendra Engineering College, Namakkal, Tamil Nadu, India 2Prof.S.Raju, HOD of IT, Mahendra Engineering College, Namakkal, Tamil Nadu, India 3Mrs.S.Rajeshwari, AP of IT, Mahendra Engineering College, Namakkal, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - A brand new fine-grained two-factor authentication (2FA) access system for web-based cloud computing services. Specifically, in our planned 2FAaccess system, AN attribute based access management mechanism is enforced with the need of each user secret key and a light- weight security device. As a user cannot access the system if she/he doesn’t hold each, the mechanism will enhance the protection of the system, particularly in those situations wherever several users share constant laptop for web based cloud services. Additionally, attribute based management within the system additionally allows the cloud server to limit the access to those users with constant set of attributes whereas conserving user privacy, i.e., the cloud server solely is aware of that the user fulfills the specified predicate, however has no plan on the precise identity of the user. Finally a tendency to perform simulation to demonstrate the utility of our planned 2FA system. Introduce the Object-sensitive RBAC (ORBAC), a generalized RBAC model for object-oriented languages. ORBAC resolves the quality limitations of RBAC by permitting roles to be parameterized by properties of the business objects being manipulated. Tend to formalize associated prove sound a dependentsortsystemthatstatically validates a program’s agreement to an ORBAC policy. Oursort system for Java and have used it to validate fine-grained access management within the Open MRS medical records system. Keywords— Two factor authentication, ORBAC model, Cloud server, business objects, access management system 1. INTRODUCTION In present position Cloud computing may be a effective host computing system that permits enterprises to shop for, lease, sell, or distribute software package connected dissimilar digital resources in excess of the net as an on- demand service. It not depends on a server or diversity of machines that actually exist, because it may be a practical system. There is a component several application of cloud computing, like in rank sharing in format ion storage huge information organization medical system etc. Finish user’s admittance cloud-based applications through an internet browser, skinny shopper or mobile app whereas the business software package and user’s information area unit hold on servers at a far off location. The compensation of web-based cloud computing services area unit giant, that grip the convenience of openness, reduced prices and wealth expenditures, hyperbolic operational efficiencies, measurability,flexibility and direct time to promote. Although the new standard of cloud computing provides nice blessings, there square measure in the meantime conjointly considerations concerning security and privacy particularly for internet primarily based cloud services. As sensitive information could also be keep within the cloud for sharing purpose or convenient access; and eligible users may additionally access the cloud system for numerous applications and services,userauthentication has become a vital element for any cloud system. A client is required to login previous to victimizationthecloudservices or accessing the responsive information keeps within the cloud. There open area evaluate two issues for the classic report code word based system First, the classic statement code word based confirmation isn't confidentiality- preserving. However, its sound known that privacy is an extremely vital feature that has to be observing about in cloud computing systems. Second, it's widespread to contribute to a laptop surrounded by completely dissimilar persons. It should be simple for hackers to put in some spyware to find out the login word from the web-browser. A newly designed way in running replica known as attribute- based entrée management could be a stylish candidate to begin the primary problem. It is not exclusively provides unidentified authentication however in additionanydefines right of entry management policies supported entirely dissimilar attributes of the requester, environment,orthein sequence object. In AN attribute-based access management system, each user encompasses a user top secret key issued by the ability. In follow, the user secret is hold on inside the non-public laptop. After think abouttheontopofmentioned second disadvantage on web-based services, it’s common that computers could also be mutual by more than a few users mainly in some huge enterprises or organizations. 2. EXISTING SYSTEM Permit the assaulter to specify the protection device for revocation. If a security device token is revoked, oracle can now not be out there. Tend to more assume the claim- predicate is chosen by the assaulter. Associate assaulter is
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1155 claimed to breach the protection demand of authentication, access while not security device or access while not secret key if it will demonstrate with success for the predicateiffor all specified it's controlled by the assaulter, unless the token has been revoked. The last condition is to capture true that the protection device is employed as a mechanism to revoke a user. A user UN agency is in possession of a security device shouldn't be ready to demonstrate anylonger whenit'sbeen revoked. Regarding the protection of our theme, the subsequent lemma. If there exists associate assaulter F against our theme, there exists a machineS,havingblack box access to F, that may existentially forge a BBS+ signature or the beg signature below the adjectivechosenmessageattack or finding the distinct log downside. Within the following tend to prove constructing the machine S below the belief that assaulter F exists. Tend to use the actual fact that area unit zero knowledge proof-of-knowledge protocols. 3. PROPOSED SYSTEM Permit the assaulter to specify the protection device for revocation. If a security device token is revoked, oracle can now not be out there. Tend to more assume the claim- predicate is chosen by the assaulter. associate assaulter is claimed to breach the protection demand of authentication, access while not security device or access while not secret key if it can manifest with success for the predicate if for all specified it's controlled bytheassaulter,unlessthetoken has been revoked. The last condition is to capture the case that the protection device is employed as a mechanism to revoke a user. A user World Health Organization is in possession of a security device mustn’t be able to manifest any longer when it's been revoked. Regarding the protection of out theme, the subsequent lemma. If there exists associate assaulter F against our theme, there exists a machine S, having black box access to F, which will existentially forge a BBS+ signature or the cadge signature below the adaptation chosen message attack or resolution the separate log downside. Within the following tendency to prove constructing the machine S below the belief that assaulter Fexists. A tendency to employ the very fact that zero knowledge proof-of-knowledge protocols. In alternative words, there exist information extractors which will extract the underlying witnesses of the corresponding protocols. Fig -1: System Architecture 3.1 Authentication The soul tries to access the system on the far side its privileges. as an example, a user with attributes student; Physics might try and access the system with policy “Staff” AND “Physics”. To do so, he might interact with alternative users. 3.2Access whiles no Security Device The soul tries to access the system (within its privileges) while not the protection device, or victimization security device happiness to others. 3.3Access while not Secret Key The soul tries to access the system(withinitsprivileges)with none secret key. It will have its own security device. 3.4Privacy The soul acts because the role of the cloud server and tries to search out the identity of the user it's interacting with. 4. FUTURE ENHANCEMENT 4.1Construction of the Meta information Information is information concerning information. Two sorts of information exist: Structural information and descriptive information. Structural information is information concerning the containers of knowledge. Descriptive information uses individual instances of application information or the info content. Metadata was historically within the card catalogs of libraries. As info has become progressively digital, information is additionally
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1156 wont to describe digital information victimization information standards specific to a selected discipline. Describing the contents and context {of information |of knowledge| of information} or data files will increase their quality. as an example, an internet page might embody information specifying what language the page is written in, what tools were wont to produce it, and wherever to search out additional info concerning the subject; this information will mechanically improve the reader's expertise. The main purpose of information is to facilitate within the discovery of relevant info, additional classified as resource discovery. Metadata conjointlyhelpsorganizeelectronicresources,give digital identification, and helps support archiving and preservation of the resource. Information assists in resource discovery by permitting resources to be found by relevant criteria, distinctiveresources,transferrablesimilarresources along, distinctive dissimilar resources, and giving location data. Descriptive information is often used for discovery and identification, as data want to search associate degreed find an object like title,author, subjects, keywords,andpublisher. Structural information offersan outline of however theparts of associate degree object organized. Associate degree example of structural information would be however pages ordered to makechaptersofabook.Finally,bodyinformation offers data to assist manage the supply. It refers to the technical data together with file sort or once and the way the file was created. Two subtypes ofbodyinformationrights management information and preservation information. Rights management information justifies belongings rights, where as preservation information contains data that’s required to preserve and save a resource. 4.2Creating an Index Tree Index tree may be a self-balancing tree system that keeps information sorted and permits searches, ordered access, insertions, and deletions in exponent time. It's a generalization of a binary search tree in this a node will have over two youngsters. In contrast to self-balancing binary search trees, the index-tree is optimized for systems that browse and writemassive blocks of information. Index-trees AR an honest example of information structure for external memory.it'sordinarilyutilizedindatabasesandclassification system. Index-trees have substantial blessings over various implementations once thetimetoaccess{theinformationthe info |the information} of a node greatly exceeds the time spent process that data, as a result of then the price of accessing the node is also amortized over multiple Operations inside the node. This typically happens once the node information AR in memory device like disk drives. By increasing theamount of keys insideevery internal node,the peak of the tree decreases and therefore the range of costly nodeaccessesisreduced.Additionally,rebalancingofthetree happens less typically. The utmost range kid |of kid} nodes depend on the data that has got to be keep for every child node and therefore the size of a full disk block or a similar size in memory device. Rebalancing starts from a leaf and payoff toward the foundation till the tree is balanced. If deleting a part from a node has brought it beneath the minimum size, then some components should be decentralized to bring all nodes up to the minimum. Usually, the distribution involves moving a part from a sib node that has over the minimum range of nodes. That distribution operation is term rotation. If no sib will spare a part, then the deficient nodeshouldbeintegrated with a sib. The merge causes the parentto lose an extractorcomponent; therefore the parent might become deficient and want rebalancing. The merging and rebalancing mightcontinueall the thanks to the foundation.Since the minimum component count does not apply to the foundation, creating the foundation is the sole deficient node isn't a retardant. 4.3 Authentication of the Users Authentication of the users with passwords AR in all probability the foremost customary means that users affirm their identities so that they AR ready to be granted entry to a given procedure. However, passwords also are regarded a vulnerable form of authentication, therefore replacement or complementary strategies are becoming wont to verify the identity of the user. Most applications have to be compelled to understand the identityofauser.Knowingauser'sidentity permits associate degree app to supply a bespoke expertise and grant them permissions to access their information. The process of proving a user'sidentityistermedauthentication. To safeguard privacy, all information collected AR hashed with a random key at the time of assortment. This secret's device-specific, generated and keep on the device, and ne'er exported. The system cannot infer the particularinformation from the hashed information,nor will it take alookatabit{of information| of knowledge| of information} to examine if it agrees with the initial data. During this means, the system balances security and privacy. The server exposes two internet service interfaces: report and question. There port interface permits consumer aspect agents to report context and activity information routinely; the question interface permits alternative entities (e.g., the authentication engine) to urge a score for a tool that indicates however traditional the behavior of the device isat the instant.Thescoredepends on current knowledge and a machine-learned model of the devices past behavior, supported a window of knowledge collected within the past.Thewindowdoesn'textendtooway within the past, in order that recent behavior is additional vital than behavior within the way past. 4.4Data Encryption and Retrieval Tend to build use of algorithmic coding to firmly encipher {the knowledge| the info| the information} in multiple parts into separate knowledge and Meta data sets that eases the search phase and ranking phases from the time intense task of secret writing and avoids the privacy problems analogous to the encrypted storage paradigm. By creating use of coding algorithmicallytheinfonamelessnessisachievedandalsothe use of recursive coding offloads the task of secret writing from the search logic. This can be more formed to rank the things in keeping with the Meta knowledge such and at any purpose of the Meta knowledge solely has to be best-known for the ranking method and doesn't would like the total
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1157 payload to be decrypted which improves the search performance and the privacy protection. 5. CONCLUSIONS A novel fine-grained two-factor authentication (2FA) access system for web-based cloudcomputingservices. Exclusively, in our proposed 2FAaccess system, AN attribute- basedright to use management method is imposed with the require of each user secret key and a light-weight security device. As a user cannot access the system if she/he doesn't hold each, the method will improve the safety of thesystem, principally in those situations wherever numerous users allocatestable laptop for web- based cloud services. Moreover, attribute- based managementwithinthesystemadditionallyallowsthe cloud server to limit the access to those users with stable set attributes here as conserving user privacy, i.e., the cloud server solely is aware of that the user fulfills the specified predicate, however has no plan on the precise identity of the user. REFERENCES [1] M. H. Au and A. Kapadia, “PERM: Practical reputation- based blacklisting withoutTTPS,”inProc.ACMConf.Comput. Commun. Secur. (CCS), Raleigh,NC, USA, Oct. 2012, pp. 929– 940. [2] M. H. Au, A. Kapadia, and W. Susilo, “BLACR:TTP-free blacklistable anonymous credentials with reputation,” in Proc. 19th NDSS, 2012, pp. 1–17. [3] M. H. Au, W. Susilo, and Y. Mu, “Constant-size dynamic k- TAA,” in Proc. 5th Int. Conf. SCN, 2006, pp.111–125. [4] J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang, “A secure cloud computing based framework for big data information management of smart grid,” IEEE Trans.Cloud Comput., vol. 3, no. 2, pp. 233–244, Apr./Jun.2015. [5] M. Bellare and O. Goldreich, “On defining proofs of knowledge,” in Proc. 12th Annu. Int. CRYPTO, 1992, pp.390– 420. [6] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertextpolicy attributebased encryption,” in Proc. IEEE Symp. Secur. Privacy, May 2007, pp. 321–334. [7] D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2004, pp. 41–55. [8] D. Boneh, X. Ding, and G. Tsudik, “Fine-grained control of security capabilities,” ACM Trans. Internet Technol., vol. 4, no. 1, pp. 60–82, 2004. [9] J. Camenisch, “Group signature schemes and payment systems based on the discrete logarithm problem,” Ph.D. dissertation, ETH Zurich, Zürich,Switzerland, 1998. [10] J. Camenisch, M. Dubovitskaya, and G. Neven,“Oblivious transfer with access control,” in Proc. 16th ACM Conf. Comput. Commun. Secur. (CCS), Chicago,IL, USA, Nov. 2009, pp. 131–140. [11] J. Camenisch and A. Lysyanskaya, “A signature scheme with efficient protocols,” in Proc. 3rd Int. Conf.Secur. Commun. Netw. (SCN), Amalfi, Italy, Sep. 2002,pp. 268–289. [12] J. Camenisch and A. Lysyanskaya, “Signature schemes and anonymous credentials from bilinear maps,” in Advances in Cryptology. Berlin, Germany:Springer-Verlag, 2004, pp. 56–72. [13] Y. Chen, Z. L. Jiang, S. M. Yiu, J. K. Liu, M. H. Au,and X. Wang, “Fully secure ciphertext-policy attribute based encryption with security mediator,” in Proc.ICICS, 2014, pp. 274–289. [14] S. S. M. Chow, C. Boyd, and J. M. G. Nieto ,“Security- mediated certificateless cryptography,” in Public Key Cryptography (Lecture Notes in Computer Science), vol. 3958. Berlin, Germany: Springer-Verlag, 2006, pp. 508–524. [15] C.-K. Chu, W.-T. Zhu, J. Han, J.-K. Liu, J. Xu, and J. Zhou, “Security concerns in popular cloud storage services,” IEEE Pervasive Comput., vol. 12, no. 4, pp. 50–57, Oct./Dec. 2013.