VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud - 2017 PROJECT TITLE : VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud - 2017 ABSTRACT: Remote information access control is of crucial importance in public cloud. Based mostly on its own inclinations, the info owner predefines the access policy. When the user satisfies the data owner’s access policy, it has the right to access the information owner’s remote knowledge. In order to improve flexibility and potency of remote information access management, attribute-based mostly encryption (for short, ABE) is used to understand the remote information fine-grained access control. For the low-capacity terminals, verifiable outsourced decryption is a terribly engaging technique. In the real application eventualities, the user’s attributes are usually managed by several authorities. When some approved users access some sensitive remote knowledge, they hope to preserve their identity privacy. From the two points, we tend to propose an anonymous distributed fine-grained access management protocol with verifiable outsourced decryption in public cloud (for brief, VOD-ADAC). VOD-ADAC may be a novel concept which is proposed for the first time in the paper. By adopting the pseudonym technique, the user’s high anonymity can be achieved by frequently changing the independent pseudonyms at some highly social spots. This paper formalizes the system model and security model of VOD-ADAC protocol. Then, by using hybrid encryption technique of distributed ABE and symmetric encryption, a concrete VOD-ADAC protocol is designed from the bilinear pairings. Through security analysis and performance analysis, our proposed VOD-ADAC protocol is provably secure and economical. Did you like this research project? To get this research project Guidelines, Training and Code... Click Here facebook twitter google+ linkedin stumble pinterest Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds - 2017 An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data - 2017