M. Subhashini, N. Sujatha


Different methods were proposed to defend data contents confidentiality by means of access control. We need to attain a multi-authority cipher text based encryption which achieves security; assurance privacy of data consumer identity information; as well as tolerating compromise attacks on authorities hence we propose a framework to permit cloud servers to manage user access privileges without finding of their identity data. While people are more worried regarding their identity privacy, it moreover needs to be protected prior to cloud entering our life.  Any of the authority or else server alone should not make out any client’s personal data.  It decentralizes central authority to confine identity leakage and as a result gets semi-anonymity and generalizes file access control to privilege control, by which privileges of the entire operations on cloud data are managed within an efficient way. The proposed framework not only data privacy, but also user identity privacy within existing access control methods.


Identity privacy; Cipher text based encryption; Cloud servers; Semi-anonymity; Multi-authority;


. H. Lin; Z. Cao; X. Liang; and J. Shao; “Secure threshold multi authority attribute based encryption without a central authority;” Information Sciences; vol. 180; no. 13; pp. 2618–2632; 2010.

. Boˇzovi´c; D. Socek; R. Steinwandt; and V. I. Vill´anyi; “Multiauthority attribute-based encryption with honest-but-curious central authority;” IJCM; vol. 89; no. 3; pp. 268–283; 2012.

. F. Li; Y. Rahulamathavan; M. Rajarajan; and R.-W. Phan; “Low complexity multi-authority attribute based encryption scheme for mobile cloud computing;” in SOSE. IEEE; 2013; pp. 573–577.

. J. Hur; “Attribute-based secure data sharing with hidden policies in smart grid;” TPDS; vol. 24; no. 11; pp. 2171–2180; 2013.

. Y. Zhang; X. Chen; J. Li; D. S. Wong; and H. Li; “Anonymous attributebased encryption supporting efficient decryption test;” in ASIACCS. ACM; 2013; pp. 511–516.

. D. Boneh and M. Franklin; “Identity-based encryption from the weil pairing;” in CRYPTO. Springer; 2001; pp. 213–229.

Full Text: PDF () PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.