Manage Cloud Data Access Control Anonymity with Attributed Based Encryption

Authors

  • Thirumanapally Prashanth Dept. of CSE, Hasvita Institute of Science and Technology, R.R District, India
  • Gundu Purna Chandar Rao Dept. of CSE, Osmania University, Hyderabad, India.

DOI:

https://doi.org/10.26438/ijcse/v5i10.373376

Keywords:

Cloud Computing, Anonymity, Multi Authority, Attribute-Based Encryption

Abstract

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.

References

A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1985, pp. 47–53.

A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2005, pp. 457–473.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. 13th CCS, 2006, pp. 89–98.

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased encryption,” in Proc. IEEE SP, May 2007, pp. 321–334.

M. Chase, “Multi-authority attribute based encryption,” in Theory of Cryptography. Berlin, Germany: Springer-Verlag, 2007, pp. 515–534.

M. Chase and S. S. M. Chow, “Improving privacy and security in multi-authority attribute-based encryption,” in Proc. 16th CCS, 2009, pp. 121–130.

H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,” Inf. Sci., vol. 180, no. 13, pp. 2618–2632, 2010.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v5i10.373376
Published: 2025-11-12

How to Cite

[1]
T. Prashanth and G. P. C. Rao, “Manage Cloud Data Access Control Anonymity with Attributed Based Encryption”, Int. J. Comp. Sci. Eng., vol. 5, no. 10, pp. 377–381, Nov. 2025.

Issue

Section

Research Article