Achieving Scalability with Data Owner Anonymity in Cloud Access Control
Journal Title: Transactions on Networks and Communications - Year 2017, Vol 5, Issue 2
Abstract
Cloud computing is a trending technology that enables subscribing organizations to outsource computations and storage, and eliminates the need of purchasing and maintaining the equipment by the organizations themselves. However, it is very challenging to maintain the privacy and security of data especially when the number of users grows dramatically. This paper focuses on achieving a high level of scalability to the cloud, allowing fine-grained access control, preserving the anonymity of the data owner and enabling the end user to verify the integrity of the data uploaded to the cloud. In order to achieve this, this paper proposes an effective scheme that uses Ciphertext Policy Attribute Based Encryption (CPABE) combined with identity-based encryption (IBE), and introduces a security mediator which signs files on behalf of the data owner to preserve the data owner’s anonymity from the cloud. This scheme allows the end user to check the integrity of the data on the cloud.
Authors and Affiliations
Abdulqader A. Bahaj, Ahmed M. Abouollo
Water Wave Optimization Algorithm based Congestion Control and Quality of Service Improvement in Wireless Sensor Networks
Many researchers have implemented various machine learning algorithms and verify their results with the existing algorithms to control congestion in Wireless Sensor Networks. The major challenge lies in developing an alg...
Toward 1.8 Tb/s CAP Schemes for Short Reach Optical Communication Systems
Wavelength-division multiplexed (WDM)carrierless amplitude/phase (CAP) modulation is proposed for1.8 Tb/sfor short reach optical communication system. The system uses 16 channels, each operates at 112 Gb/s. A single-band...
ZRSA Algorithm
Today, RSA algorithm is one of the encryption algorithm that is used widely. However, with the advances in computer power it is becoming susceptible to be cracked. It is become a necessity to develop a new algorithm that...
Setting an Optimization Problem of Distributing Traffic Across Multiple Independent Paths
Communication network development is considered as an urgent need for the world. The proposed work in this paper is to solve the problem of the traffic engineering, using the multi-path routing mechanisms by applying a d...
Seven Cool Number Patterns
Inspired by a number pattern found while reading an online newspaper seven number patterns are created. Behind each pattern there is a distinct algorithm. Some of these patterns are a sequence of a single or double digit...