E. Sulamithi, Pathri Dheeraja


In the literature, many techniques have been proposed to preserve the privacy of data contents through access control. In literary works, previous work focused on the privacy of data content, as well as on access control, while less emphasis was placed on supervisory privileges, as well as privacy. We offer almost anonymous privilege control to address data privacy issues, but also user identity privacy in the current access control system. The method to control this privilege decentralizes the central authority to reduce the flight of identity, thus acquiring almost anonymity and schematic tolerance against the concessions of power. It allows servers in the cloud to administer access privileges to a user who is free to know their identity information and the proposed scheme can defend the privacy of the user against each authority.


Access Control; Cloud Servers; Semi-Anonymity; Privilege Control; Data Contents; Data Privacy; Central Authority;


K. Alhamazani et al., “An overview of the commercial cloud monitoring tools: Research dimensions, design issues, state-of-the-art,” Computing, DOI: 10.1007/s00607-014-0398-5, 2014, to be published.

A. N. Khan, M. L. M. Kiah, S. U. Khan, and S. A. Madani, “Towards secure mobile cloud computing: A survey,” Future Gen. Comput. Syst., vol. 29, no. 5, pp. 1278–1299, Jul. 2013.

D. Chen et al., “Fast and scalable multi-way analysis of massive neural data,” IEEE Trans. Comput., DOI: 10.1109/TC.2013.2295806, 2014, to be published.

A. N. Khan, M. M. Kiah, S. A. Madani, M. Ali, and S. Shamshir-band, “Incremental proxy re-encryption scheme for mobile cloud computing environment,” J. Supercomput., vol. 68, no. 2, pp. 624–651, May 2014.

P. Gutmann, “Secure deletion of data from magnetic and solid-state memory,” in Proc. 6th USENIX Security Symp. Focusing Appl. Cryptography, 1996, p. 8.

S. Seo, M. Nabeel, X. Ding, and E. Bertino, “An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds,” IEEE Trans. Knowl. Data Eng., vol. 26, no. 9, pp. 2107–2119, Sep. 2013.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at