ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Certain Investigations on Anonymous Authentication Mechanisms for Data Stored in Clouds

J.Ganeshkumar, N.Rajesh, J.Elavarasan, Prof.M.Sarmila Prof.S.Balamurugan
  • Department of IT, Kalaignar Karunanidhi Institute of Technology, Coimbatore, TamilNadu, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

This paper details about various methods prevailing in literature of anonymous authentication mechanisms for data stored in clouds. It is a Decentralized access of system in which every system have the access control of data . The Cloud which is a Secured storage area where the anonymous authentication is used, so that only the permitted users can be accessed. Decrypting of data can be viewed only by a valid users and can also stored information only by Valid users. This Scheme prevents Replay attack which mean Eaves Dropping can be avoided, Support Creation of data inside storage, Modifying the data by unknown users , and Reading data stored in Cloud. User can revocate the data only by addressing through the cloud. The authentication and accessing the Cloud is Robust, Hence Overall Communication Storage are been developed by comparing to the Centralized approaches. This paper would promote a lot of research in the area of Anonymous Authentication.

Keywords

Data Anonymization, Matching Dependencies(MDs), Object, Similarity Constraints, Information Mining.

INTRODUCTION

Researching a Cloud ,which makes to know about the use both in Academic and as well as in industrial Works.The Cloud can be used only through the Internet and the data stored in Cloud is very Secure and privacy so that the Authentication in Cloud by User can retrieve a Secure Transaction , in other hand the user must ensure that data received doesn’t had an any error. Wang et al who addressed cloud is a Secured and Dependable storage area. Cloud servers can have a Byzantine failure which mean any unknown error can occur in Cloud and even an Colluding attack , to prevent the error data must be encrypted while Designing the Secure storage techniques. The Searching of encrypted data is an important concern in the Cloud in which queries are used to Obtain the data. Cloud should not know the Query but it must be able to return the records by specifying the keyword through the Query,thus the records are obtained only with the exact keyword. Many researcher had addressed about the security and privacy that protects in clouds, Wang et al had introduced Reed-Solomon erasure coding which is used to check the Multiple random symbol error. The Authentication by the users are been using the public Cryptographic Technique. Many Homomarphic Encryption have been suggested that cloud couldn’t able to read the data while the cloud Computation , Using the homomarphic Encryption the cloud gets the Encrypted data by the User which mean a Cipher Text and this text is decoded and sended to the Reciever and checks the cipher text received,but the Cloud cannot know what the data is been operated.

PRIVACY PRESERVING ACCESS CONTROL WITH AUTHENTICATION FOR SECURING DATA IN CLOUDS

S. Ruj, M. Stojmenovic, and A. Nayak(2012) proposed a privacy preserving authentication access for the cloud security. The proposed scheme of the paper tells that user can store information without knowing the user’s identitfy , this scheme also prevent replay attack, support creation ,modification, and reading the stored data. The data can be decrypted only by the valid user. Since it is a Decentralized authentication access which is compared and developed according to the Centralized users.

TOWARDS SECURE AND DEPENDABLE STORAGESERVICES IN CLOUD COMPUTING

C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou,(2012) proposed a Cloud storage makes the user to store the information remotely and can be accessed the high definition quality without burden using the hardware and the software. Thought it had a benefit the service makes the user to find a security risk in the access and the storage. So that this paper proposed a flexible distributed storage integrity auditing mechanism and utilizing the homomarphic token and distributed erasure code data . This design which makes very light weight communication of data and a computation cost , auditing result not only ensure the storage correctness guarantee but it also achieves an error by the modification of an location error failure by the server . Considering the cloud is an dynamic in nature ,the cloud can produce an secured outsourced data including the block modification deletion, and an append. Thus this paper proposed it is an highly efficient against a byzantine failure ,malicious data modification attack and server colluding attack.

ENABLING EFFICIENT FUZZY KEYWORD SEARCH OVERENCRYPTED DATA IN CLOUD COMPUTING

J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou,(2010) proposed a cloud storage which becomes a prevalent and a storage of more sensible data it is secured by a privacy, since the data which is outsourced from the cloud is encrypted and the data can be accessed using the keywords and only with the exact keywords the data can be retrieved. This drawback which makes in pre-existence of the cloud computing to be greatly affect by system usability, rendering user searching experienced very frustrating and system efficacy very low. In this paper the author uses the fuzzy keyword to search the data in the cloud,this fuzzy key word which returns the result by showing the data matching to existed search or by relating the search when the data matching fails.In this solution the fuzzy keyword develop two advanced techniques on constructing fuzzy keyword sets, which achieve optimized storage and representation overheads. Thus the paper proposed a technique symbol based tree traversing in which the fuzzy key words are constructed through the multi way tree structure. Hence through this paper the fuzzy key words is used for the security and privacy purpose of the retrieval data and a efficient access.

IDENTITY-BASED AUTHENTICATION FOR CLOUD COMPUTING

H. Li, Y. Dai, L. Tian, and H. Yang, (2009) proposed a Cloud computing is one of the recently developed technology which is used in a massive scale between the user and the server, and it is also a secured way of accessing. SSL Authentication Protocol (SAP) which is applied and become a complex in both computation and communication , based on the identity-based hierarchical model for cloud computing(IBHMCC) and its corresponding encryption and signature schemes a new authentication protocol which is used in the Cloud and the service. Through this authentication it is shown as light weight and more efficient compared to the SAP thus it is used in the great scalability between the Cloud and the service.

A FULLY HOMOMARPHIC ENCRYPTION SCHEME

C. Gentry,(2009) proposed fully a homomarphic encryption technique is used in which one allows to encrypt the data using the arbitrary function over the encrypted data without decrypting.i.e., given encryptions E(m1),….,E(mt) of m1,….,mt, one can efficiently compute a compact ciphertext that encrypts f(m1,….,mt) for any efficiently computable function f. This problem was posed by Rivest et al. in 1978. Homomarhic encryption scheme has a numerous application for example the the private query used in the search engine returns the succinct encrypted answer without looking the query clearly ,a user stores encrypted files on aRemote file server and can later have the server retrieve, only files that (when decrypted)satisfy some boolean constraint. Thus the construction begins with the “boostrappable “ encryption that works when the function f own by its own during the decryption function.Hence through recursive self embedding and bootstrappable encryption the homomarphic encryption is used and it makes use of hard problems on ideal lattices

TOKEN-BASED CLOUD COMPUTING SECURE OUTSOURCING OF DATA AND ARBITRARY COMPUTATIONS WITH LOWER LATENCY

A.-R. Sadeghi, T. Schneider, and M. Winandy,(2010) proposed the Secured outsourcing of data from untrusted cloud service is more important and the cryptographic solution is fully based on the homomarphic encryption and its an verifyable encryption , recently proposed that this has an high latency where other proposal performs on tamper proof hardware and get suffer from the same problem ,so that the Trusted computing (TC) wich is an another approach where the trusted hardware and the trusted software is been used in computer platform to verify the integrity of the cloud and its computation. Thus these are in under physical control of cloud provider and it have to face the challenging face of run time attestation . In this paper the author focuses mainly on the application to minimize the latency of computation i.e the timing between the query submission and the outsourcing of the data is must be small as possible . to achieve this they combines the trusted hardware with the Secured Function Encryption (SFE) to produce the arbitrary function so that it doesn’t leaks any information and its an verifyable Thus the token is used in the setup phase only whereas in the time-critical online phase the cloud computes the encrypted function on encrypted data using symmetric encryption primitives only and without any interaction with other entities.

CONCLUSION AND FUTURE WORK

This paper dealt about various methods prevailing in literature of anonymous authentication mechanisms for data stored in clouds. It is a Decentralized access of system in which every system have the access control of data . The Cloud which is a Secured storage area where the anonymous authentication is used, so that only the permitted users can be accessed. Decrypting of data can be viewed only by a valid users and can also stored information only by Valid users. This Scheme prevents Replay attack which mean Eaves Dropping can be avoided, Support Creation of data inside storage, Modifying the data by unknown users , and Reading data stored in Cloud. User can revocate the data only by addressing through the cloud. The authentication and accessing the Cloud is Robust, Hence Overall Communication Storage are been developed by comparing to the Centralized approaches. This paper would promote a lot of research in the area of Anonymous Authentication.

References