A Survey Paper on Securing Cloud Computing using ABS Signatures
DOI:
https://doi.org/10.61841/y1m28x64Keywords:
Attribute Based Signature, Cloud ComputingAbstract
In the realm of specialized life, distributed computing has ended up as a basic part; furthermore, understanding the method for business is changing and is prone to keep changing into what's to come. Utilizing distributed storage administrations implies that you and others can get to and offer documents over a scope of gadgets and positions. Records, for example, photographs and recordings, can once in a while be unmanageable to email in the event that they are too enormous or you have a portion of information. You can transfer your information to a distributed storage supplier, which implies you can rapidly flow your information with the assistance of cloud administration, and you can impart your information documents to anybody you pick. Since distributed computing shares disseminated assets by means of a system in the open environment along these lines, it makes it less secure. Information security has turned into a noteworthy issue in information sharing on the cloud. The fundamental witticism behind our framework is that it secures the information and produces the key for every exchange so every client can secure our common information from the outsider, i.e., the untrustworthy programmer
Downloads
References
1. Secure Outsourced Attribute Based Signature IEEE Transactions on Parallel and Distributed
Systems, (Volume: PP, Issue: 99) 2014
2. Improving Security and Efficiency in Attribute-Based Data Sharing JunbeomHur IEEE
Transactions on Knowledge and Data Engineering Vol: 25 No: 10 2013
3. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based
Encryption Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou, IEEE Transactions
On Parallel And Distributed Systems Vol. Xx, No. Xx, Xx 2012
4. Attribute-based Server-Aided Verification Signature Zhiwei Wang∗, RuiruiXie and ShaohuiWangAppl. Math. Inf. Sci. 8, No. 6, 3183-3190 (2014)
5. Secure Attribute-based Threshold Signature without a Trusted Central Authority Sun Changxia Ma
Wenping Journal of Computers, Vol. 7, No. 12, December 2012
6. Short Attribute-Based Signatures for Threshold Predicates Javier Herranz, Fabien Laguillaumie,
Benoıt Libert, and Carla Rafols "RSA Conference 2012, San Francisco : United States (2012)"
7. Improving Revocation Scheme to Enhance the Performance in Multi-Authority ABE Shraddha U.
Rasal Bharat TidkeInternational Journal of Computer Applications (0975 – 8887) Volume 90 – No
18, March 2014
8. Attribute-Based Signatures Hemanta K. MajiManojPrabhakaran Mike Rosulek November 22, 2010
9. Provable Secure Multi-Authority Attribute Based Signatures Yanli Chen, JunjunChen,GengYang
Journal of Convergence Information Technology(JCIT) Volume 8, Number 2,Jan 2013
10. R. L. Rivest, A. Shamir, and Y. Tauman. How to leak a secret. In C. Boyd, editor, ASIACRYPT,
volume 2248 of Lecture Notes in Computer Science, pages 552–565. Springer, 2001
11. D. Chaum and E. van Heyst. Group signatures. In EUROCRYPT, pages 257–265, 1991
12. X. Boyen. Mesh signatures. In M. Naor, editor, EUROCRYPT, volume 4515 of Lecture Notes in
Computer Science, pages 210–227. Springer, 2007.
13. Dynamic Credentials and Cipher text Delegation for Attribute-Based Encryption Amit Sahai UCLA
HakanSeyalioglu†, UCLA Brent Waters‡, University of Texas at AustinAugust 1, 2012
14. Romann, M., Javet, M., & Fuchslocher, J. (2017). Coaches' eye as a valid method to assess
biological maturation in youth elite soccer. Talent Development and Excellence, 9(1), 3-13.
Retrieved from www.scopus.com
15. Tarn, C. S. Y., Phillipson, S. N., & Phillipson, S. (2016). "Creativity" reform in hong kong:
Validation of the creative inventions test. Talent Development and Excellence, 8(2), 3-19. Retrieved
from www.scopus.com
16. Lammers, D. (2017). Deep learning could boost yields, increase revenues. Solid State Technology,
60(3), 20-23. Retrieved from www.scopus.com
17. Lammers, D. (2017). SiPs simplify wireless IoT design. Solid State Technology, 60(2), 17-19.
Retrieved from www.scopus.com27
18. Song, C., & Shimamoto, S. (2018). A study on realization of combined amplitude and phase
modulation employing elliptical signals. International Journal of Advanced Science and
Technology, 24, 43-68. Retrieved from www.scopus.com
19. Toptsis, A. A. (2017). Reflective thinking, machine learning, and user authentication via artificial
K-lines. International Journal of Advanced Science and Technology, 23, 51-74. Retrieved from
www.scopus.com
20. Toptsis, A. A., Chaturvedi, R. A., & Feroze, A. (2017). Kohonen-guided parallel bidirectional
voronoi-assisted heuristic search. International Journal of Advanced Science and Technology, 23,
15-34. Retrieved from www.scopus.com
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.