ISSN ONLINE(2319-8753)PRINT(2347-6710)
J.Ganeshkumar, N.Rajesh, J.Elavarasan, Prof.M.Sarmila and Prof.S.Balamurugan Department of IT, Kalaignar Karunanidhi Institute of Technology, Coimbatore, TamilNadu, India |
Related article at Pubmed, Scholar Google |
Visit for more related articles at International Journal of Innovative Research in Science, Engineering and Technology
This paper details about various methods prevailing in literature of anonymous authentication mechanisms for data stored in clouds. It is a Decentralized access of system in which every system have the access control of data . The Cloud which is a Secured storage area where the anonymous authentication is used, so that only the permitted users can be accessed. Decrypting of data can be viewed only by a valid users and can also stored information only by Valid users. This Scheme prevents Replay attack which mean Eaves Dropping can be avoided, Support Creation of data inside storage, Modifying the data by unknown users , and Reading data stored in Cloud. User can revocate the data only by addressing through the cloud. The authentication and accessing the Cloud is Robust, Hence Overall Communication Storage are been developed by comparing to the Centralized approaches. This paper would promote a lot of research in the area of Anonymous Authentication.
Keywords |
Data Anonymization, Matching Dependencies(MDs), Object, Similarity Constraints, Information Mining. |
INTRODUCTION |
The Security of storage is not only enough to store , the user must also check the anonymity of the user. For example the user wants to post a comment on Article but doesn’t want his/her to disclosed. There are three cryptographic protocols such as Ring Signature, Mesh Signature ,Group Signature. The Ring Signature which meam a large number of users are been involved so it is not feasible. The Mesh Signature which does not ensure whether the message is from the single user or from a group user and it colludes the information .The Group Signature which is not possible because of the pre-existing in the group.For these kind of reasons a new protocol Attribute Based Signature is been introduced in which the users have claim predicate associate with the message. Hence the ABS is Combined with ABE for the authenticaton Access Control by not showing users identity in the Cloud. |
The Author take a centralized approach in where the Single Key Distribution center(KDC) which distributes the Secret key and the attributes to all user. In this the failure not only occurred at a Single point and it is also difficult to maintain by a large number of user in Cloud, finally the author decided to have a decentralized sytem to make the work less and to access by the user from varios location from the world using many KDC’s. Yang et al proposed, this decentralized access must also need the technique of anonymous of accessing the cloud while authentication. In earlier Ruj et al proposed the distributed access Control and this does not provide the authentication. The other drawback is the Creator can only create and store the file. So that user who reads the Data can have only the read access and doesn’t had the permission to write in the data except by Creator. In the preliminary version the data which enables the authentication of validity message without identifying the user who had stored in Cloud . We use ABS scheme for the authentication and the privacy for the Cloud , it is a resistant from replay attack , revoling of its attribute might no lomger be able to write to the cloud. Therefore in this scheme the writing multiple times was permitted which was not supportedin earlier work. |
DACC: DISTRIBUTED ACCESS CONTROL IN CLOUDS |
S. Ruj, A. Nayak, and I. Stojmenovic,(2011) proposed a data storage and access in which the multiple encrypted copies of data can be avoided. The main novelty of this paper is producing the key distribution centers where one or more KDCs distribute keys to data owners and users. KDC provide access to particular fields in all records. Single keys seprates the data and the data owners, using this technique the user own the data by having the attribute it had, and this can be retrieved only if the attribute matches the data. The Author apply the attributebasedencryption (ABE ) based on bilinear pairings on elliptic curves. This scheme is collusion secure in which two users cannot together decode any data , that no one has individual right to access. DACC also supports revocation of users, without re-distributing keys to all the users of cloud services. We show that our approach resultsin lower communication, computation and storage overheads, compared to existing models and schemes. |
EASIER: ENCRYPTION-BASED ACCESS CONTROL IN SOCIAL NETWORKS WITH EFFICIENT REVOCATION |
S. Jahid, P. Mittal, and N. Borisov,(2011) proposed it is an approach of privacy risk in the Online Social Network (OSN’s) , in which it shifts OSN provider to User by Encryption. This creates a key management and the dynamic groups , to address this problem the author proposed the EASiER an architectural support in Fine grained access control and the dynamic group by the Attribute based Encryption. It is possible to remove access from a user without issuing new keys to other users or re-encrypting existing ciphertexts , this is achieved by creating the proxies and using this proxy can minimally trusted and cannot decrypt ciphertexts or provide access to previously revoked users. This type of technique is used in FACEBOOK |
ATTRIBUTE-BASED SIGNATURES: ACHIEVING ATTRIBUTE-PRIVACY COLLUSION RESISTANCE |
D. Chaum and E.V. Heyst,(1991) proposed a Attribute based Signature in which the signature attests not to identify the individual of the message by a user instead it claim regarding the attribute that produced by the user.The signature was produced by a single party whose attributes satisfy the claim being made i.e it is not colluding the all individuals instead it just make the attribute together who pooled it.The author explains the security requirements of ABS as a cryptographic primitive, and then tells that efficient ABS construction based on groups with bilinear pairings. Thus by proving the construction is secure in the generic group model, ABS fills a critical security requirement in attribute-based messaging(ABM) systems.A powerful feature of ABS construction is that unlike many other attributebased cryptographic primitives, it can be readily used in a multi-authority setting, wherein users can make claims involving combinations of attributes issued by independent and mutually distrusting authorities. |
SECURED SCHEME FOR SECRET SHARING AND KEY DISTRIBUTION |
A. Beimel,(1996) proposed the sharing of data, now a days take place in Computer Networks, and the data which is been communicated inside the network may affected through the bad users,to overcome this user users two Cryptographic tools such as Generalized Secret Sharing scheme and Key distribution scheme. This make it possible to store only the secret information in the network such that only good users can access the information . the secret sharing scheme mostly received through the threshold secret sharing schemes, only through the certain threshold the information can accessed and can used by the user. In generalized secret sharing it is capable of arbitrary monotone collection whereas in Key distribution scheme the keys can be used Communication key Distribution scheme does not help in unrestricted scheme on other hand secured and restricted scheme can be accessed only through limits.Linear Secret Sharing Scheme , Monotone Span programs ,Secret sharing the public reconstruction , computation function of shared secret keys are used |
FUZZY IDENTITY-BASED ENCRYPTION |
A. Sahai and B. Waters,(2005) Proposed a new Identity-Based Encryption (IBE) scheme that is called as Fuzzy Identity-Based Encryption ,A Fuzzy IBE private key was identity by ω whereas the ciphertext encrypted is identified by ω’.It identities ω and ω’ are close to each other as measured by the “set overlap” distance metrics. It used to apply the Encryption by obtaining the biometric input as identifier which inherently will have some noise each time they are sampled.Thus it is used for a type of application that we term “attribute-based encryption”.In this paper two construction of Fuzzy IBE scheme are involved where the Identity-Based Encryption of a message under several attributes that compose a (fuzzy) identity. Hence in this scheme both are error-tolerant and secure against collusion attacks. |
CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION |
J. Bethencourt, A. Sahai, and B. Waters,(2007) proposed Certain distributed system the user can access the data only if the data consist of credential or attributes. Only way of enforcing such data in Cloud can be performed through the Trusted server to store the data and accessing the cloud. In this paper the complex access control on the encrypted data is performed in which the Cipher text policy Attribute-Based Encryption is used. By using this scheme the storage data can be kept confidential even when the storage is untrusted, and this method secures against the collusion attack. The Previous Attribute Based Encryption systems used attributes to describe the encrypted data and even to built policies into user's keys; while in our system attributes are used to describe a user's credentials, and a party encrypting data determines a policy for who can decrypt. Thus this method uses the Role Based access Control (RBAC). |
MULTI-AUTHORITY ATTRIBUTE BASED ENCRYPTION |
M. Chase,(2007) proposed identity based encryption the user use the identity to search the data whereas in attribute based ecryption involves attribute to search the data. Sahai and water introduced a single authority attribute encryption scheme and left the question whether the multiple authorities allowed todistribute system. This scheme allows any polynomial number of independent authoritiesto monitor attributes and distribute secret keys. An encryptor can choose, for each authority, a number dk and a set of attributes. Thus this scheme tolerate an arbitrary number of corrupt authoritites. |
OUTSOURCING THE DECRYPTION OF ABE CIPHERTEXTS |
M. Green, S. Hohenberger, and B. Waters,(2011) proposed ABE is only used in cloud storage and many Computing application.The main drawback of the Ciphertext is size of the text and the time required to complexity of the access formula. ABE ciphertexts are stored in the cloud. In which a user can provide the cloud with a single transformationkey that allows the cloud to translate any ABE ciphertext satisfied by that user’s attributes into a (constant-size) El Gamalstyle ciphertext, without the cloud being able to read any part of the user’s messages. This provide a new secured definitions for both CPA and replayable CCA security with outsourcing ,several new constructions, an implementation of our algorithms and detailed performance measurements. In a typical configuration, the user saves significantly on both bandwidth and decryption time, without increasing the number of transmissions. |
SECURE AND EFFICIENT ACCESS TO OUTSOURCED DATA |
W. Wang, Z. Li, R. Owens, and B. Bhargava,(2009) proposed by providing secure and efficient access to outsourced data should be must in cloud computing .To encrypt every data block with a different key the flexible cryptography-based access control is used. Through this key derivation methods, the owner should maintain only a few secrets in the storage . and this key derivation procedure is used in hash functions which will introduce very limited computation .Thus to use over-encryption and or lazy revocation to prevent revokedusers from getting access to updated data blocks. A Mechanism is used to handle both updates to outsourced data and changes in user access rights. Hence it is investigated in the overhead and safety of the proposed approach. |
CONCLUSION AND FUTURE WORK |
This paper dealt about various methods prevailing in literature of anonymous authentication mechanisms for data stored in clouds. It is a Decentralized access of system in which every system have the access control of data . The Cloud which is a Secured storage area where the anonymous authentication is used, so that only the permitted users can be accessed. Decrypting of data can be viewed only by a valid users and can also stored information only by Valid users. This Scheme prevents Replay attack which mean Eaves Dropping can be avoided, Support Creation of data inside storage, Modifying the data by unknown users , and Reading data stored in Cloud. User can revocate the data only by addressing through the cloud. The authentication and accessing the Cloud is Robust, Hence Overall Communication Storage are been developed by comparing to the Centralized approaches. This paper would promote a lot of research in the area of Anonymous Authentication. |
References |
|