Header menu link for other important links
X
Multi Authority Privacy Preserving Protocol in Cloud Computing Authentication using Grouping Algorithm and EDAC-MAC
Published in Institute of Electrical and Electronics Engineers Inc.
2019
Pages: 1053 - 1058
Abstract
Many organizations store data to the cloud in a manner that anyone within the organization may share data with a member within the organization or outside the organization. They may also want to restrict data access and the mechanisms to control shared data access. Here a simple, efficient and verified approach to ensure the integrity of data stored in the cloud is proposed. Here, grouping algorithm along with EDAC-MACS is used to provide effective security control with revoking and decryption being more efficient with different algorithms for encryption as well as decryption. In the encryption mechanism a method is introduced which enables metadata generation for verification (signatures). However, consequent to this, the data owner identity is preserved and is not exposed to any other member or user of the cloud. The owners and the users are pushed to different groups without the user or the owner's concern to which policy or which group they belong to. The distinctive feature of this method along with encryption and decryption is that grouping algorithm is used along with EDAC-MACS to provide effective security control and also provides revoking algorithm for users who are suspected. Security analyses prove that this scheme is secure, and experiment results demonstrate that it is efficient. © 2019 IEEE.