Ganam Swathi, Ch. Vijayakumari


In literature many techniques were recommended to preserve the privacy of understanding contents by means of access control. In literature previous works have focussed on privacy of understanding contents in addition to get involved with control, while less focus is created towards privilege control in addition to identity privacy. We provide a privilege control technique that's semi-anonymous for dealing the issues of understanding privacy but additionally privacy of user identity inside the existed plan of access control. This privilege control method decentralizes central authority to limit leakage of identity and therefore gains semi-anonymity combined with the plans tolerant against authority compromise.  It permit cloud servers to deal with user access legal rights missing of knowing their identity information combined with the recommended plan's able to defend user privacy against every single authority and here partial particulars are revealed.


Access Control; Cloud Servers; Semi-Anonymity; Privilege Control; Data Contents; Data Privacy; Central Authority;


M. Chase and S. S. Chow, “Improving privacy and security in multiauthority attribute-based encryption,” in CCS. ACM, 2009, pp. 121– 130.

H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,” Information Sciences, vol. 180, no. 13, pp. 2618–2632, 2010.

V. Boˇzovi´c, D. Socek, R. Steinwandt, and V. I. Vill´anyi, “Multiauthority attribute-based encryption with honest-but-curious central authority,” IJCM, vol. 89, no. 3, pp. 268–283, 2012.

A. Kapadia, P. Tsang, and S. Smith, “Attribute-based publishing with hidden credentials and hidden policies,” NDSS, 2007.

S. Yu, K. Ren, and W. Lou, “Attribute-based content distribution with hidden policy,” in Workshop on Secure Network Protocols. IEEE, 2008.

Z. Wan, J. Liu, and R. H. Deng, “Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing,” Information Forensics and Security, IEEE Transactions on, vol. 7, no. 2, pp. 743–754, 2012.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at