Anonymous Authentication using ABE for Securing Cloud Storage

Sadanand H Bhuse, Sinhgad Academy of Engineering; Santosh Shelke ,Sinhgad Academy of Engineering

Cryptography, CP-ABE, KP-ABE, Anonymous Authentication, Multi-Tenancy

In recent days cloud is the best option to store data and provide various services such as Infrastructure as a service cloud, Platform as a service cloud, Software as a service cloud and also communication as a service cloud. Cloud can be used for the various purposes, may be publically open or privacy based secured for sensitive information. The information in cloud can be secured in many ways as per the needs of the users. The authorization and authentication is the main issue in any service from such clouds. The attribute based encryption is the way to secure the authentication process to access and to control the access to the cloud and cloud services. Using same theme the authentication can be done without knowing the identity of the users i.e. to keep user anonymous for the curious system as well as administrator of the system. Considering decentralized access control and need to hide identity of the user, the concept of anonymous authentication is introduced and discussed in this paper. The multitenant SaaS is considered here and few issues related to ABE are focused.
    [1] Sushmita Ruj,Milos Stojmenovic,Amiya Nayak. “Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds”, IEEE Transactions on Parallel And Distributed Systems,Vol-25,2014 [2] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption”, IEEE Symposium on Security and Privacy. , pp. 321–334, 2007 [3] Muhammad Asim, Milan Petkovic, Tanya Ignatenko,”Attribute Based Encryption and Decryption Outsourcing”, 12Th Australian Information Security Management Conference ,13 Dec 2014 [4] Umech Chandra Yadav, “Cipher text-Poliecy Attribute Based Encryptioin with Hiding Access Structure”, Advance Computing Conference (IACC), 2015 [5] GH Gowthami, G.G. Sreeja, B. Rajtha, “Control Cloud Data Access Privilege Using Attribute Based Encryption”, IRACST, Vol 6 No.2, March April 2016. [6] Divya L, Hema S, Kayalvizhi C, “Fully Annonymous Attribute Based Encryption for Privilege and Anonymity access control in cloud”, IJETCSE,Vol 21 Issue 2, April 2016 [7] S.E. Wang, B.G.Lin, “ A scheme of attribute based encryption access policy used in mobile cloud storage for personal health record” , IEEE, 2014. [8] M.Sowmiya, M. Adimoolam, “Secure Cloud Storage Model with Hidden Policy Attribute based Access Control”, IEEE International Conference on recent trends in Information Technology, 2014 [9] Shradhha Mokle, Nuzhat F Shaikh, “Anonymous Authentication for secure data stored on cloud with decentralized access control”, IEEE WiSPNET conference 2016. [10] Sadanand H Bhuse, Santosh N Shelke “A Noble Approach for Decentralized Access Control to Secure Cloud Storage Using ABA Authentication” Fifth post graduate conference of Computer Engineering-cPGCON , 2016 [11] Xingbing Fu, Zufeng Wu, “Ciphertext Policy Attribute Based Encryption with Immediate Attribute revocation for fine grained Access Control in Class Storage”, IEEE , 2013. [12] Zechao Liu et al. ,“Dynamic Attribute Based Access Control in Cloud Storage Systems” , IEEE Trust Com –Big Data SE ISPA, 2016 [13] Lifeng Li, Xiaowan Chen , Hai Jiang, “P-CP –ABE: Parallelizing Ciphertext –Policy Attribute Based Encryption for Clouds” IEEE SNPD, May 2016. [14] Ms.S. Vijaya Lekshmi, Mrs. M.P. Revathi, “Implementing Secure Data access Control for Multi Authority Cloud Storage System Using Ciphertext Policy Attribute Based Encryption”,IEEE- ICICES2014 Chennai 2014. [15] Karthik, Chandrashekhar B N Lakshmi H, “Fully Anonymous Attribute Based Encryption with Privacy and Access Pricilege”, IEEE- International Conference on Computational System and Information System for Sustainable Solutions,2016. [16] Dr. V.G. Goutham, K. Sunitha, P. Lakshmi, “Manage Cloud Data Access Opportunity and Anonymity with fully anonymous with secure status”, IJARCSSE-Vol. 6 Issue-6 , June 2016. [17] Sumeet Pate, Saurabh Gadhari, Vishal Mane, “Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption”, IJREAM, March 2016. [18] Ileana Buhan, Emile Kelkboom, Koen Simoens, “A Survey of the Security and Privacy Measures for [19] Anonymous Biometric Authentication Systems,”IEEE, Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2010. [20] Mate Horvath, “Private Key Delegation in Attribute-Based Encryption. [21] Susan Hohenberger and Brent Waters “Attribute-Based Encryption with Fast Decryption”, May 8 2013. [22] Yingjie Xue et al, “LABAC: A Location-aware Attribute-based Access Control Scheme for Cloud Storage”, IEEE, 2016. Web References [23] gleamly.com/article/introduction-attribute-based-encryption-abe [24] cryptowiki.net/index.php?title=Attribute-based encryption
Paper ID: GRDJEV02I050092
Published in: Volume : 2, Issue : 5
Publication Date: 2017-05-01
Page(s): 326 - 330