A Survey Paper on Securing Cloud Computing using ABS Signatures

Authors

  • Ms. Shruti Timande Research Department, Yashika Publications India Author
  • Mr. Dharmesh Dhabliya Research Department, Yashika Publications India Author

DOI:

https://doi.org/10.61841/y1m28x64

Keywords:

Attribute Based Signature, Cloud Computing

Abstract

 In the realm of specialized life, distributed computing has ended up as a basic part; furthermore, understanding the method for business is changing and is prone to keep changing into what's to come. Utilizing distributed storage administrations implies that you and others can get to and offer documents over a scope of gadgets and positions. Records, for example, photographs and recordings, can once in a while be unmanageable to email in the event that they are too enormous or you have a portion of information. You can transfer your information to a distributed storage supplier, which implies you can rapidly flow your information with the assistance of cloud administration, and you can impart your information documents to anybody you pick. Since distributed computing shares disseminated assets by means of a system in the open environment along these lines, it makes it less secure. Information security has turned into a noteworthy issue in information sharing on the cloud. The fundamental witticism behind our framework is that it secures the information and produces the key for every exchange so every client can secure our common information from the outsider, i.e., the untrustworthy programmer 

Downloads

Download data is not yet available.

References

1. Secure Outsourced Attribute Based Signature IEEE Transactions on Parallel and Distributed

Systems, (Volume: PP, Issue: 99) 2014

2. Improving Security and Efficiency in Attribute-Based Data Sharing JunbeomHur IEEE

Transactions on Knowledge and Data Engineering Vol: 25 No: 10 2013

3. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based

Encryption Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou, IEEE Transactions

On Parallel And Distributed Systems Vol. Xx, No. Xx, Xx 2012

4. Attribute-based Server-Aided Verification Signature Zhiwei Wang∗, RuiruiXie and ShaohuiWangAppl. Math. Inf. Sci. 8, No. 6, 3183-3190 (2014)

5. Secure Attribute-based Threshold Signature without a Trusted Central Authority Sun Changxia Ma

Wenping Journal of Computers, Vol. 7, No. 12, December 2012

6. Short Attribute-Based Signatures for Threshold Predicates Javier Herranz, Fabien Laguillaumie,

Benoıt Libert, and Carla Rafols "RSA Conference 2012, San Francisco : United States (2012)"

7. Improving Revocation Scheme to Enhance the Performance in Multi-Authority ABE Shraddha U.

Rasal Bharat TidkeInternational Journal of Computer Applications (0975 – 8887) Volume 90 – No

18, March 2014

8. Attribute-Based Signatures Hemanta K. MajiManojPrabhakaran Mike Rosulek November 22, 2010

9. Provable Secure Multi-Authority Attribute Based Signatures Yanli Chen, JunjunChen,GengYang

Journal of Convergence Information Technology(JCIT) Volume 8, Number 2,Jan 2013

10. R. L. Rivest, A. Shamir, and Y. Tauman. How to leak a secret. In C. Boyd, editor, ASIACRYPT,

volume 2248 of Lecture Notes in Computer Science, pages 552–565. Springer, 2001

11. D. Chaum and E. van Heyst. Group signatures. In EUROCRYPT, pages 257–265, 1991

12. X. Boyen. Mesh signatures. In M. Naor, editor, EUROCRYPT, volume 4515 of Lecture Notes in

Computer Science, pages 210–227. Springer, 2007.

13. Dynamic Credentials and Cipher text Delegation for Attribute-Based Encryption Amit Sahai UCLA

HakanSeyalioglu†, UCLA Brent Waters‡, University of Texas at AustinAugust 1, 2012

14. Romann, M., Javet, M., & Fuchslocher, J. (2017). Coaches' eye as a valid method to assess

biological maturation in youth elite soccer. Talent Development and Excellence, 9(1), 3-13.

Retrieved from www.scopus.com

15. Tarn, C. S. Y., Phillipson, S. N., & Phillipson, S. (2016). "Creativity" reform in hong kong:

Validation of the creative inventions test. Talent Development and Excellence, 8(2), 3-19. Retrieved

from www.scopus.com

16. Lammers, D. (2017). Deep learning could boost yields, increase revenues. Solid State Technology,

60(3), 20-23. Retrieved from www.scopus.com

17. Lammers, D. (2017). SiPs simplify wireless IoT design. Solid State Technology, 60(2), 17-19.

Retrieved from www.scopus.com27

18. Song, C., & Shimamoto, S. (2018). A study on realization of combined amplitude and phase

modulation employing elliptical signals. International Journal of Advanced Science and

Technology, 24, 43-68. Retrieved from www.scopus.com

19. Toptsis, A. A. (2017). Reflective thinking, machine learning, and user authentication via artificial

K-lines. International Journal of Advanced Science and Technology, 23, 51-74. Retrieved from

www.scopus.com

20. Toptsis, A. A., Chaturvedi, R. A., & Feroze, A. (2017). Kohonen-guided parallel bidirectional

voronoi-assisted heuristic search. International Journal of Advanced Science and Technology, 23,

15-34. Retrieved from www.scopus.com

Downloads

Published

07.04.2025

How to Cite

Timande, S., & Dhabliya, D. (2025). A Survey Paper on Securing Cloud Computing using ABS Signatures. International Journal of Psychosocial Rehabilitation, 23(5), 828-834. https://doi.org/10.61841/y1m28x64