Z. Noor Fatima, B.V.S. P.Pavan Kumar


The help of cloud computing has attracted much attention from academia in addition to industry due to profitability however it's several challenges. Within our work we advise a competent way of enabling cloud servers to manage user access rights lacking of knowing their identity data. The suggested product is a semi-anonymous privilege control proposal for controlling of not just data privacy, but furthermore user identity privacy within traditional techniques of access control. This method decentralizes central authority to limit the leakage of identity and therefore attains semi-anonymity. Additionally, it furthermore generalizes file access control for privilege control, through which rights from the entire procedures over the system of cloud data re handled within fine-grained manner.


Cloud Computing; Fine Grained; Semi-Anonymous; Data Privacy; Central Authority; Privileges;


H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,” Information Sciences, vol. 180, no. 13, pp. 2618–2632, 2010.

H. Ma, G. Zeng, Z. Wang, and J. Xu, “Fully secure multi-authority attribute-based traitor tracing,” JCIS, vol. 9, no. 7, pp. 2793–2800, 2013.

Y. Liu, J. Han, and J. Wang, “Rumor riding: anonymizing unstructured peer-to-peer systems,” TPDS, vol. 22, no. 3, pp. 464–475, 2011.

A. Kapadia, P. Tsang, and S. Smith, “Attribute-based publishing with hidden credentials and hidden policies,” NDSS, 2007.

L. Zhang, X.-Y. Li, and Y. Liu, “Message in a sealed bottle: Privacy preserving friending in social networks,” in ICDCS. IEEE, 2013, pp. 327–336.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at