Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/342198
Title: | An optimized trust model based on anonymous authentication using multiple attributes for cloud |
Researcher: | Usha S |
Guide(s): | Tamilarasi A |
Keywords: | Cloud computing Cryptography |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | The success of cloud computing relies chiefly on trust and security that factor issues such as the lack of protection and privacy, assuring security and the author rights. Trust goes beyond the permitted trait of security association amongst human societies. This helps in attaining stability and leads to better implementation that results from the trust association amongst people, firms and groups. Thus, assuring secure implementation of distributed applications has become paramount to the trust based security mechanisms in a corporate, comprising several user oriented open network environments which is the objective of trust relationships. The cloud based access control is generally centralized. In such systems, there is a single key distribution centre. A single key is utilized for both encrypting as well as decrypting. This does not comprise or support authentication that is unknown. Thus, decentralized schemes are preferred for storing data as that there is no leakage of the private details of a user. These are attribute based and multi-authority access control schemes. This scheme makes use of the cipher text policy attribute based encryption and all of the attribute keys are issued by the attribute authority to the user without the need to know his personal details. Additionally, Diffie-Hellman Merkle key exchange algorithm is used for activating and deactivating the user, along with the user revocation scheme. A user revocation list that is made publicly accessible throughout the cloud comprises the revoked users. This policy will determine the users who can be granted access or denied access to data on the cloud. The behavior of the users in the cloud will determine the data access privilege. A changed version of the Digital Signature Algorithm (DSA) which makes use of the elliptic curve cryptography is referred to as the Elliptic newline |
Pagination: | xviii,136p. |
URI: | http://hdl.handle.net/10603/342198 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 28.95 kB | Adobe PDF | View/Open |
02_certificates.pdf | 240.5 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 439.53 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 319.9 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 86.16 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 498.89 kB | Adobe PDF | View/Open | |
07_contents.pdf | 90.27 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 80.36 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 16.5 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 295.13 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 187.41 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 158.84 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 354.01 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 190.67 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 690.35 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 17.91 kB | Adobe PDF | View/Open | |
17_references.pdf | 144.24 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 83.51 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 112.44 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: