Augmented Privacy-Preserving Authentication Protocol by Trusted Third Party in Cloud
B.Sameena Begum, P.Ragha Vardhini, , ,
Cloud management give well-mannered space for the clients to get delight from the on-demand cloud applications while not
considering the local framework confinements. All through the data getting to, totally diverse clients is additionally in an exceptionally delightful
relationship, thus learning sharing gets to be crucial to accomplish gainful edges. the common security measures essentially focus on the
validation to comprehend that a client's privative learning can't be unapproved gotten to, however This paper concentrates on giving a
trustworthy and secure cloud data sharing administration that permits clients element access to their data. Keeping in mind the end goal to
accomplish this, we propose a compelling, versatile and adaptable security saving data strategy with semantic security; by using ciphertext
policy attribute based encryption (CP-ABE) joined with identity-based encryption (IBE) methods despite guaranteeing strong data sharing
security, our strategy succeeds in safeguarding the protection of cloud clients and backings proficient and secure element operations including,
yet not restricted to, document creation, client denial and change of client characteristics. Security investigation shows that the proposed
approach is secure under the nonexclusive bilinear gathering model in the arbitrary prophet model and upholds fine-grained access control, full
conspiracy resistance and in reverse mystery. Moreover, execution examination and test results demonstrate that the overheads are as light as
would be prudent.
B.Sameena Begum,P.Ragha Vardhini."Augmented Privacy-Preserving Authentication Protocol by Trusted Third Party in Cloud". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 05,pp.378-382, May- 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I520.pdf,
1] H. Y. Lin and W. G. Tzeng, â€œA Secure Erasure Code-Based CloudStorage System with Secure Data Forwarding,â€ IEEE Transactions on Parallel and Cloud Systems, vol. 23, no. 6, pp. 995- 1003, 2012.
 I. T. Lien, Y. H. Lin, J. R. Shieh, and J. L. Wu, â€œA Novel Privacy Preserving Location-Based Service Protocol with Secret Circular Shift for K-nn Search,â€ IEEE Transactions on Data Forensics and Security, [online] ieeexplore. ieee.org/stamp/stamp.jsp?tp=&arnumber=6476 681, 2013.
 R. SÂ´anchez, F. Almenares, P. Arias, D. DÂ´Ä±azSÂ´anchez, and A.MarÂ´Ä±n, â€œEnhancing Privacy and Dynamic Federation in IdM foR Consumer Cloud Computing,â€ IEEE Transactions on ConsumerElectronics, vol. 58, no. 1, pp. 95-103, 2012.
 Y. Tang, P. C. Lee, J. C. S. Lui, and R. Perlman, â€œSecure Overlay Cloud Storage with Access Control and Assured Deletion,â€ IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 903-916, 2012.
 A. Mishra, R. Jain, and A. Durresi, â€œCloud Computing: Networking and Communication Challenges,â€ IEEE Communications Magazine, vol. 50, no. 9, pp, 24-25, 2012.
 J. Chen, Y. Wang, and X. Wang, â€œOn-Demand Security Architecture for Cloud Computing,â€ Computer, vol. 45, no. 7, pp. 73- 78,2012 .
 H. Wang, â€œProxy Provable Data Possession in Public Clouds,â€IEEE Transactions on Services Computing, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnu mber=6357181, 2012.
 L. A. Dunning and R. Kresman, â€œPrivacy Preserving Data Sharing With Anonymous ID Assignment,â€ IEEE Transactions on Data Forensics and Security, vol. 8, no. 2, pp. 402-413, 2013.
 Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, â€œEnabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,â€ IEEE Transactions on Parallel and Cloud Systems,vol. 22, no. 5, pp. 847-859, 2011.
Y. Zhu, H. Hu, G. Ahn, and M. Yu, â€œCooperative Provable DataPossession for Integrity Verification in Multi-cloud Storage,â€ IEEE Transactions on Parallel and Cloud Systems, vol. 23, no, 12, pp. 2231-2244, 2012.
Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors.
News & Events
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞ LAST DATE OF SUBMISSION : 31st March 2023
☞ SUBMISSION TO FIRST DECISION : In 7 Days
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION
All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.