FUZZY-BASED CRYPTOSYSTEM FOR REVOLUTIONARY OPEN NETS

Rendla Sagar, B. Ravi Kumar

Abstract


In literature many techniques were suggested to preserve the privacy of understanding contents by way of access control. In literature previous works have focussed on privacy of understanding contents furthermore to get into control, while less focus is produced towards privilege control furthermore to identity privacy. We offer a privilege control technique that's semi-anonymous for dealing the problems of understanding privacy but in addition privacy of user identity within the existed plan of access control. This privilege control method decentralizes central authority to limit leakage of identity and thus gains semi-anonymity along with the plan's tolerant against authority compromise.  It permit cloud servers to cope with user access legal rights missing of knowing their identity information along with the suggested plan's capable of defend user privacy against each and every authority and here partial details are disclosed.


Keywords


Access Control; Cloud Servers; Semi-Anonymity; Privilege Control; Data Contents; Data Privacy; Central Authority;

References


H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,” Inf. Sci., vol. 180, no. 13, pp. 2618–2632, 2010.

V. Božovi´c, D. Socek, R. Steinwandt, and V. I. Villányi, “Multi-authority attribute-based encryption with honest-but-curious central authority,” Int. J. Comput. Math., vol. 89, no. 3, pp. 268–283, 2012.

F. Li, Y. Rahulamathavan, M. Rajarajan, and R. C.-W. Phan, “Low complexity multi-authority attribute based encryption scheme for mobile cloud computing,” in Proc. IEEE 7th SOSE, Mar. 2013, pp. 573–577.

J. Liu, Z. Wan, and M. Gu, “Hierarchical attribute-set based encryption for scalable, flexible and fine-grained access control in cloud computing,” in Information Security Practice and Experience. Berlin, Germany: Springer-Verlag, 2011, pp. 98–107.

A. Kapadia, P. P. Tsang, and S. W. Smith, “Attribute-based publishing with hidden credentials and hidden policies,” in Proc. NDSS, 2007, pp. 179–192.

S. Yu, K. Ren, and W. Lou, “Attribute-based content distribution with hidden policy,” in Proc. 4th Workshop Secure Netw. Protocols, Oct. 2008, pp. 39–44.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.