TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

0
478
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

Abstract

Attribute-based Encryption (ABE) is considered a promising cryptographic conducting tool to ensure the direct control of data owners in public cloud storage over their data. The earlier ABE schemes involve only one authority to maintain the entire set of attributes, which can bring a single point bottleneck to both security and performance. Subsequently, some multi-authority schemes are proposed A Robust and Verifiable Threshold Multi-Authority Access Control System in which multiple authorities separately maintain sub-sets of disjoint attributes. The single-point bottleneck problem, however, remains unresolved. In this TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage paper, from another perspective, we conduct a multi-authority threshold CP-ABE access control scheme for public cloud storage, called TMACS, in which multiple authorities jointly manage a uniform set of attributes.

System Configuration

H/W System Configuration
Speed                   : 1.1 GHz
RAM                      : 256 MB(min)
Hard Disk              : 20 GB
Floppy Drive          : 1.44 MB
Key Board             : Standard Windows Keyboard
Mouse                  : Two or Three Button Mouse
Monitor                : SVGA
S/W System Configuration

Platform                     :  cloud computing

Operating system       : Windows Xp,7,
Server                       : WAMP/Apache
Working on                : Browser Like Firefox, IE

Conclusion

This paper proposes a semi-anonymous attribute-based privilege control scheme Anonymity Control and a fully anonymous attribute-based privilege control scheme Anonymity Control to address the privacy issue in a cloud storage server. Using Attribute Authority in the cloud computing system, our proposed schemes achieve not only fine-grained privilege control but also identity anonymity while conducting privilege control based on user identity information.