A trust based security framework with anonymous authentication system using multiple attributes in decentralized cloud
- 119 Downloads
Abstract
The cloud computing is established as the technology that provides all the need oriented and the use dependent IT resources that has been used very frequently for the business information systems. In relation to the terms of integration of all the decentralized information systems, the cloud systems have been providing an approach for stable solution. But the data security has been found to be a major challenge in the using of cloud systems and being a main reason as to why the companies avoid cloud service usage. The main question that is faced is the manner in which the cloud systems are used for the integration of such decentralized information systems that are to be designed and based on the technology and the organization to ensure privacy of law of that of the cloud user that may be guaranteed. Today there is a lot of attention that is being received from the academic as well as the perspective of the industry by means of an in depth cloud computing resource. There are several issues of security like availability, confidentiality and integrity. The experts have been studying the anonymous authentication for the data archiving to the clouds. In the conditions in which there is a communication that is achieved without penalty or fear, an anonymous authentication will be important. This has been needed by the organizations for protecting all their vital data from that of their industrial espionage. From among the techniques of authentication that has been attributed to a decentralized mechanism it may appear to be efficient. For this work, a trust-based secure and anonymous authentication for multiple attributes is make use of. The Recursive Best First Search (RBFS) algorithm will be used for finding the optimal weights from among the trust partners.
Keywords
Cloud computing Anonymous authentication Decentralized mechanism Depth first Branch and Bound and Recursive Best First algorithmReferences
- 1.Ruj, S., Stojmenovic, M., Nayak, A.: Decentralized access control with anonymous authentication of data stored in clouds. IEEE Trans. Parallel Distrib. Syst. 25(2), 384–394 (2014)Google Scholar
- 2.Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: 2009 17th International Workshop on Quality of Service, IWQoS (2009)Google Scholar
- 3.Younis, M.Y.A., Kifayat, K.: Secure cloud computing for critical infrastructure: a survey. In: Liverpool John Moores University, Technical Report, pp. 599–610 (2013)Google Scholar
- 4.Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: IEEE INFOCOM, pp. 441–445 (2010)Google Scholar
- 5.Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Financial Cryptography Workshops, ser. Lecture Notes in Computer Science, vol. 6054, pp. 136–149. Springer (2010)Google Scholar
- 6.Krishna, C.M.S.R., Samuel, G.J.: Decentralized access control with Anonymous authentication of data stored in cloud (2016)Google Scholar
- 7.Kallem, S.R.: Artificial Intelligence Algorithms, IOSR. J. Comput. Eng. (IOSRJCE) 6(3), 1–8 (2012)Google Scholar
- 8.Patil, M.T., Katraj, P.: A survey on different techniques used in decentralized cloud computing. Int. J. Sci. Eng. Appl. 116(18), 11–17 (2016)Google Scholar
- 9.Li, W., Ping, L.: Trust model to enhance security and interoperability of cloud environment. Cloud Comput. 5931, 69–79 (2009)Google Scholar
- 10.Zhu, C., Nicanfar, H., Leung, V.C., Yang, L.T.: An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans. Inf. Forens. Secur. 10(1), 118–131 (2015)Google Scholar
- 11.Usha, S., Sangeetha, P.: Multiple attribute authority based access control and anonymous authentication in decentralized cloud. Bonfring Int. J. Data Min. 6(3), 24–29 (2016)Google Scholar
- 12.Chuang, M.C., Lee, J.F.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8(3), 749–758 (2014)Google Scholar
- 13.Malone, B., Yuan, C.: A depth-first branch and bound algorithm for learning optimal Bayesian networks. In: Graph Structures for Knowledge Representation and Reasoning, pp. 111–122. Springer, Cham (2014)Google Scholar
- 14.Lelis, L.H., Otten, L., Dechter, R.: Predicting the size of depth-first branch and bound search trees. In: IJCAI, pp. 594–600, (2013)Google Scholar
- 15.Hatem, M., Kiesel, S., Ruml, W.: Recursive best-first search with bounded overhead. In: AAAI, pp. 1151–1157 (2015)Google Scholar
- 16.Almeida, A., Dantas, F., Cavalcante, E., Batista, T.: A branch-and-bound algorithm for autonomic adaptation of multi-cloud applications. In: Cluster, Cloud and Grid Computing (CCGrid), 2014 14th IEEE/ACM International Symposium on, pp. 315–323. IEEE (2014)Google Scholar
- 17.Wu, L., Garg, S.K., Buyya, R.: SLA-based resource allocation for software as a service provider (SaaS) in cloud computing environments. In: Proceedings of the 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 195–204. IEEE Computer Society (2011)Google Scholar
- 18.Tang, J., Tay, W.P., Quek, T.Q.: Cross-layer resource allocation with elastic service scaling in cloud radio access network. IEEE Trans. Wirel. Commun. 14(9), 5068–5081 (2015)Google Scholar
- 19.Speitkamp, B., Bichler, M.: A mathematical programming approach for server consolidation problems in virtualized data centers. IEEE Trans. Serv. Comput. 3(4), 266–278 (2010)Google Scholar
- 20.Sharma, D., Dubey, S.K.: Comparative study of RBFS & ARBFS algorithm. IOSR J. Comput. Eng. 10(5), 105–110 (2013)Google Scholar