Cluster Computing

, Volume 22, Supplement 2, pp 3883–3892 | Cite as

A trust based security framework with anonymous authentication system using multiple attributes in decentralized cloud

  • S. UshaEmail author
  • A. Tamilarasi


The cloud computing is established as the technology that provides all the need oriented and the use dependent IT resources that has been used very frequently for the business information systems. In relation to the terms of integration of all the decentralized information systems, the cloud systems have been providing an approach for stable solution. But the data security has been found to be a major challenge in the using of cloud systems and being a main reason as to why the companies avoid cloud service usage. The main question that is faced is the manner in which the cloud systems are used for the integration of such decentralized information systems that are to be designed and based on the technology and the organization to ensure privacy of law of that of the cloud user that may be guaranteed. Today there is a lot of attention that is being received from the academic as well as the perspective of the industry by means of an in depth cloud computing resource. There are several issues of security like availability, confidentiality and integrity. The experts have been studying the anonymous authentication for the data archiving to the clouds. In the conditions in which there is a communication that is achieved without penalty or fear, an anonymous authentication will be important. This has been needed by the organizations for protecting all their vital data from that of their industrial espionage. From among the techniques of authentication that has been attributed to a decentralized mechanism it may appear to be efficient. For this work, a trust-based secure and anonymous authentication for multiple attributes is make use of. The Recursive Best First Search (RBFS) algorithm will be used for finding the optimal weights from among the trust partners.


Cloud computing Anonymous authentication Decentralized mechanism Depth first Branch and Bound and Recursive Best First algorithm 


  1. 1.
    Ruj, S., Stojmenovic, M., Nayak, A.: Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans. Parallel Distrib. Syst. 25(2), 384–394 (2014)Google Scholar
  2. 2.
    Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: 2009 17th International Workshop on Quality of Service, IWQoS (2009)Google Scholar
  3. 3.
    Younis, M.Y.A., Kifayat, K.: Secure cloud computing for critical infrastructure: a survey. In: Liverpool John Moores University, Technical Report, pp. 599–610 (2013)Google Scholar
  4. 4.
    Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: IEEE INFOCOM, pp. 441–445 (2010)Google Scholar
  5. 5.
    Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Financial Cryptography Workshops, ser. Lecture Notes in Computer Science, vol. 6054, pp. 136–149. Springer (2010)Google Scholar
  6. 6.
    Krishna, C.M.S.R., Samuel, G.J.: Decentralized access control with Anonymous authentication of data stored in cloud (2016)Google Scholar
  7. 7.
    Kallem, S.R.: Artificial Intelligence Algorithms, IOSR. J. Comput. Eng. (IOSRJCE) 6(3), 1–8 (2012)Google Scholar
  8. 8.
    Patil, M.T., Katraj, P.: A survey on different techniques used in decentralized cloud computing. Int. J. Sci. Eng. Appl. 116(18), 11–17 (2016)Google Scholar
  9. 9.
    Li, W., Ping, L.: Trust model to enhance security and interoperability of cloud environment. Cloud Comput. 5931, 69–79 (2009)Google Scholar
  10. 10.
    Zhu, C., Nicanfar, H., Leung, V.C., Yang, L.T.: An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans. Inf. Forens. Secur. 10(1), 118–131 (2015)Google Scholar
  11. 11.
    Usha, S., Sangeetha, P.: Multiple attribute authority based access control and anonymous authentication in decentralized cloud. Bonfring Int. J. Data Min. 6(3), 24–29 (2016)Google Scholar
  12. 12.
    Chuang, M.C., Lee, J.F.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8(3), 749–758 (2014)Google Scholar
  13. 13.
    Malone, B., Yuan, C.: A depth-first branch and bound algorithm for learning optimal Bayesian networks. In: Graph Structures for Knowledge Representation and Reasoning, pp. 111–122. Springer, Cham (2014)Google Scholar
  14. 14.
    Lelis, L.H., Otten, L., Dechter, R.: Predicting the size of depth-first branch and bound search trees. In: IJCAI, pp. 594–600, (2013)Google Scholar
  15. 15.
    Hatem, M., Kiesel, S., Ruml, W.: Recursive best-first search with bounded overhead. In: AAAI, pp. 1151–1157 (2015)Google Scholar
  16. 16.
    Almeida, A., Dantas, F., Cavalcante, E., Batista, T.: A branch-and-bound algorithm for autonomic adaptation of multi-cloud applications. In: Cluster, Cloud and Grid Computing (CCGrid), 2014 14th IEEE/ACM International Symposium on, pp. 315–323. IEEE (2014)Google Scholar
  17. 17.
    Wu, L., Garg, S.K., Buyya, R.: SLA-based resource allocation for software as a service provider (SaaS) in cloud computing environments. In: Proceedings of the 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 195–204. IEEE Computer Society (2011)Google Scholar
  18. 18.
    Tang, J., Tay, W.P., Quek, T.Q.: Cross-layer resource allocation with elastic service scaling in cloud radio access network. IEEE Trans. Wirel. Commun. 14(9), 5068–5081 (2015)Google Scholar
  19. 19.
    Speitkamp, B., Bichler, M.: A mathematical programming approach for server consolidation problems in virtualized data centers. IEEE Trans. Serv. Comput. 3(4), 266–278 (2010)Google Scholar
  20. 20.
    Sharma, D., Dubey, S.K.: Comparative study of RBFS & ARBFS algorithm. IOSR J. Comput. Eng. 10(5), 105–110 (2013)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringUniversity College of EngineeringTiruchirappalliIndia
  2. 2.Department of MCAKongu Engineering CollegePerunduraiIndia

Personalised recommendations