Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/342198
Title: An optimized trust model based on anonymous authentication using multiple attributes for cloud
Researcher: Usha S
Guide(s): Tamilarasi A
Keywords: 
Cloud computing
Cryptography
University: Anna University
Completed Date: 2020
Abstract: The success of cloud computing relies chiefly on trust and security that factor issues such as the lack of protection and privacy, assuring security and the author rights. Trust goes beyond the permitted trait of security association amongst human societies. This helps in attaining stability and leads to better implementation that results from the trust association amongst people, firms and groups. Thus, assuring secure implementation of distributed applications has become paramount to the trust based security mechanisms in a corporate, comprising several user oriented open network environments which is the objective of trust relationships. The cloud based access control is generally centralized. In such systems, there is a single key distribution centre. A single key is utilized for both encrypting as well as decrypting. This does not comprise or support authentication that is unknown. Thus, decentralized schemes are preferred for storing data as that there is no leakage of the private details of a user. These are attribute based and multi-authority access control schemes. This scheme makes use of the cipher text policy attribute based encryption and all of the attribute keys are issued by the attribute authority to the user without the need to know his personal details. Additionally, Diffie-Hellman Merkle key exchange algorithm is used for activating and deactivating the user, along with the user revocation scheme. A user revocation list that is made publicly accessible throughout the cloud comprises the revoked users. This policy will determine the users who can be granted access or denied access to data on the cloud. The behavior of the users in the cloud will determine the data access privilege. A changed version of the Digital Signature Algorithm (DSA) which makes use of the elliptic curve cryptography is referred to as the Elliptic newline
Pagination: xviii,136p.
URI: http://hdl.handle.net/10603/342198
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File28.95 kBAdobe PDFView/Open
02_certificates.pdf240.5 kBAdobe PDFView/Open
03_vivaproceedings.pdf439.53 kBAdobe PDFView/Open
04_bonafidecertificate.pdf319.9 kBAdobe PDFView/Open
05_abstracts.pdf86.16 kBAdobe PDFView/Open
06_acknowledgements.pdf498.89 kBAdobe PDFView/Open
07_contents.pdf90.27 kBAdobe PDFView/Open
08_listoftables.pdf80.36 kBAdobe PDFView/Open
09_listoffigures.pdf16.5 kBAdobe PDFView/Open
10_listofabbreviations.pdf295.13 kBAdobe PDFView/Open
11_chapter1.pdf187.41 kBAdobe PDFView/Open
12_chapter2.pdf158.84 kBAdobe PDFView/Open
13_chapter3.pdf354.01 kBAdobe PDFView/Open
14_chapter4.pdf190.67 kBAdobe PDFView/Open
15_chapter5.pdf690.35 kBAdobe PDFView/Open
16_conclusion.pdf17.91 kBAdobe PDFView/Open
17_references.pdf144.24 kBAdobe PDFView/Open
18_listofpublications.pdf83.51 kBAdobe PDFView/Open
80_recommendation.pdf112.44 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: