PRIVILEGED INFORMATION MANIPULATION STRATEGY IN OPEN NETWORK

G. Priyanka, S. Rajesh, Prof. Dr A. Kiranmayee

Abstract


In literature many techniques were recommended to preserve the privacy of understanding contents by means of access control. In literature previous works have focussed on privacy of understanding contents in addition to get involved with control, while less focus is created towards privilege control in addition to identity privacy. We provide a privilege control technique that's semi-anonymous for dealing the issues of understanding privacy but additionally privacy of user identity inside the existed plan of access control. This privilege control method decentralizes central authority to limit leakage of identity and therefore gains semi-anonymity combined with the plan's tolerant against authority compromise.  It permit cloud servers to deal with user access legal rights missing of knowing their identity information combined with the recommended plan's able to defend user privacy against every single authority and here partial particulars are revealed.


Keywords


Access Control; Cloud Servers; Semi-Anonymity; Privilege Control; Data Contents; Data Privacy; Central Authority;

References


Y. Zhang, X. Chen, J. Li, D. S. Wong, and H. Li, “Anonymous attribute based encryption supporting efficient decryption test,” in ASIACCS. ACM, 2013, pp. 511–516.

S. Yu, K. Ren, and W. Lou, “Attribute-based content distribution with hidden policy,” in Workshop on Secure Network Protocols. IEEE, 2008.

Z. Wan, J. Liu, and R. H. Deng, “Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing,” Information Forensics and Security, IEEE Transactions on, vol. 7, no. 2, pp. 743–754, 2012.

T. Jung, X. Mao, X.-Y. Li, S.-J. Tang, W. Gong, and L. Zhang, “Privacypreserving data aggregation without secure channel: Multivariate polynomial evaluation,” in INFOCOM. IEEE, 2013, pp. 2634–2642.

S. Hohenberger and B. Waters, “Attribute-based encryption with fast decryption,” in PKC. Springer, 2013, pp. 162–179.

J. Hur, “Attribute-based secure data sharing with hidden policies in smart grid,” TPDS, vol. 24, no. 11, pp. 2171–2180, 2013.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.