A New Distributed Access Control Schema For Secure Data Stored In Clouds
|
|
- Ruth French
- 5 years ago
- Views:
Transcription
1 A New Distributed Access Control Schema For Secure Data Stored In Clouds 1 P.PRAVEEN KUMAR, 2 DR. G.VENKATA RAMI REDDY 1 M.Tech Student, Department of CSE, School of Information Techology, JNTUH, Kukatpally, Ranga Reddy District, Telangana, India. 2 Associate Professor, Department of CSE, School of Information Techology, JNTUH, Kukatpally, Ranga Reddy District, Telangana, India. ABSTRACT We propose a fresh out of the box new confined access administration subject for secure information stockpiling in mists, that backings mysterious confirmation. inside of the arranged subject, the cloud veri fies the authenticity of the ser while not knowing the client's personality before putting away information. Our plan conjointly has the worth included element of access administration inside which exclusively substantial clients square measure prepared to unravel the hang on information. The plan forestalls replay assaults and backings creation, modi fication, and perusing information hang on inside of the cloud. we watch out for conjointly address client renouncement. Additionally, our verification and access administration topic is restricted and solid, not care for distinctive access administration plans planned for mists that square measure incorporated. The correspondence calculation what's more, stockpiling overheads square measure worship brought together methodologies. Decisive words: Access administration, Authentication, Attribute-based marks, Attribute-based mystery composing, Cloud stockpiling 1.INTRODUCTION: In cloud computing, users will source their computation and storage to servers (also called clouds) exploitation web. Abundant of the info keep in clouds is awfully perceptive. For example, medical records and social network. Security and privacy are so vital problems in cloud computing. In one hand, the user ought to attest itself before initiating any business, and on the contrary hand, it should be ensured that the cloud doesn't tamper with the info that's outsourced. User privacy is additionally needed so the cloud or different users do not detain the identity of the user. The cloud will clasp the user accountable for the info it outsources and similarly the cloud is itself liable for the services it provides. The authority of the user United Nations agency stores the info is additionally verified. Except for the technical solutions to confirm security and privacy, there's conjointly a craving for law social control. Efficient search on encrypted knowledge is additionally a very important concern in clouds. The clouds shouldn't detain the question however ought to be able to come the records that satisfy the question. This is often achieve by means that of searchable cryptography[3]. The keywords are transfers to the cloud encrypted, and also the cloud precedes the result even as not knowing the particular keyword for the search[4]. The matter here is that the info records ought to have keywords related to them to change the search. The suitable records are come back only searched with the precise keywords. Security and privacy protection in clouds are being explored by many researchers. [2]Addressed storage security abuse Reed-Solomon erasure-correcting code. [5]Confirmation of users using public key cryptanalytic techniques has been studied. Many homomorphism cryptography techniques are instructed[6], [7] to confirm that the cloud isn't ready to scan the info while performing
2 arts computations on them. Management of homomorphism encryption, the cloud receives cipher text of the info and performs computations on the cipher text and returns the encoded worth of the result. The user is ready to translate the result.however the cloud will not apprehend what knowledge it's operated on. In such state of dealings, it must be within your capabilities for the user to verify that the cloud returns correct results. Neither clouds nor users should deny any operations performed or requested. It s necessary to own log of the statement performed; but it is an important concern to choose what quantity data to stay within the log. Answerability has been addressed in Trust Cloud. 2.RELATEDWORK: (1) ABE was arranged by Sahai and Waters [26]. In ABE, a client has an arrangement of ascribes furthermore to its particular ID. There ar 2classes of ABEs. (2) In Key-approach ABE or KP-ABE (Goyal et al.)[27], the sender has partner degree access strategy to compose data. (3) An author whose qualities and keys are denied can't compose back stale information. (4) The collector gets properties and mystery keys from the trait power and is in a position to disentangle information on the off chance that it's coordinating qualities. (5) In Ciphertext-strategy, CP-ABE)[28, [29], the collector has the entrance approach inside of the style of a tree, with characteristics as leaves and monotonic access structure with AND, OR. (6) All the methodologies take a brought together approach and allow singularly one KDC that could be a solitary motivation behind disappointment[30]. Pursue arranged a multi-power ABE, inside which there ar numerous KDC powers (composed by a beyond any doubt power) that convey credits and mystery keys to clients. (7) Multi-power ABE convention was mulled over in[31],[32] that required no beyond any doubt power which needs every client to claim qualities from at all the KDCs. As of late, [35] Lewko and Waters arranged a totally limited ABE wherever clients may have zero or a great deal of characteristics from each power and did not require a beyond any doubt server. by and large these cases, coding at client's completion is processing serious. Along these lines, this system can be wasteful once clients access abuse their cell phones. To get over this disadvantage, unpracticed et al. wanted to source the unscrambling assignment to an intermediary server, all together that the client will figure with least assets (for instance, hand-held gadgets). In any case, the vicinity of 1 intermediary and one key dissemination focus makes it less strong than restricted methodologies. Both these methodologies had forget about it to validate clients, namelessly. To guarantee unknown client verification Attribute based basically Signatures were presented by Maji et al.. This was furthermore a unified methodology. A late subject by steady creators takes a limited approach and gives confirmation while not uncovering the personality of the clients. In any case as specified prior inside of the past segment it's at danger of replay assault. SECURITY OF THE PROTOCOL we will prove the safety of the protocol. We will show that our theme authenticates a user United Nations agency needs to jot down to the cloud. A user will solely write provided the cloud is in a position to validate its access claim. associate invalid user cannot receive attributes from a KDC, if it doesn't have the credentials from the trustee. If a user s credentials are revoked, then it cannot replace information with previous stale information, so preventing replay attacks. solely a sound user with valid access claim is only able to store the message within the cloud. This follows from the functions ABS.Sign and ABS.A user United Nations agency needs to form a file and tries to form a false access claim, cannot do thus, as a result of it'll not have attribute keys Kx from the connected KDCs. At an equivalent time since the message is encrypted, a user while not valid access policy cannot decipher and change the data. Two users cannot interact and make associate access policy consisting of attributes shared between them. Our theme is immune to replay attacks. If a writer s access claims ar revoked, it cannot replace an {information} with stale information from previous writes. this can be as a result of it's
3 to connect a replacement time stamp τ and sign the message H(C) τ once more. Since it doesn't have attributes, it cannot have a sound signature. 3.PROPOSED PRIVACY PRESERVING AUTHENTICATED ACCESS CONTROL SCHEME: (8) In this section we tend to propose our privacy protective attested access management theme. in line with our theme a user will produce a file and store it firmly within the cloud. This theme consists of use of the 2 protocols ABE and ABS, as mentioned in Section III-D and III-E severally. we'll initial discuss our theme in details then offer a concrete example to demonstrate how it works. we tend to visit the Fig. 1. There area unit 3 users, a creator, a reader and author. Creator Alice receives a token γ from the trustee, UN agency is assumed to be honest. A trustee will be somebody just like the federal UN agency manages social insurance numbers etc. On presenting her id (like health/social insurance number), the trustee offers her a token γ. There are multiple KDCs (here 2), which may be scattered. for instance, these may be servers in numerous elements of the globe. A creator on presenting the token to 1 or a lot of KDCs receives keys for encryption/decryption and language. In the Fig. 1, SKs area unit secret keys given for coding, Kx area unit keys for language. The message MSG is encrypted below the access policy X. The access policy decides UN agency will access the information hold on within the cloud. The creator decides on a claim policy Y, to prove her believability and signs the message below this claim. The ciphertext C with signature is c, and is shipped to the cloud. The cloud verifies the signature and stores the ciphertext C. once a scaner needs to read, the cloud sends C. If the user has attributes matching with access policy, it will rewrite and obtain back original message. A. Data Storage in clouds: The user on presenting this token obtains attributes and secret keys from one or additional KDCs. A key for AN attribute x happiness to KDC Ai is calculated as K x = Kbase1/(a+bx), where (a, b) ASK[i]. The user conjointly receives secret keys skx,u for encrypting messages. The user then creates AN access policy X that may be a monotone Boolean perform. The message is then encrypted beneath the access policy as The user conjointly constructs a claim policy Y to modify the cloud to evidence the user. The creator doesn't send the message M SG as is, however uses the time stamp τ and creates H(C) τ. This is done to stop replay attacks. If the time stamp isn't sent,then the user will write previous stale message back to the cloud with a sound signature, even once its claim policy and attributes have been revoked. the initial work by Maji et al. suffers from replay attacks. In their theme, a author will send its message and correct signature even once it now not has access rights. In our theme a author whose rights are revoked cannot create a brand new signature with new time stamp and therefore cannot write back stale data. B. Reading from the cloud: When a user requests information from the cloud, the cloud sends the ciphertext C mistreatment SSH protocol. Coding income mistreatment algorithm ABE.Decrypt(C,) and therefore the message MSG is calculated. C. Writing to the cloud: To write to AN already existing file, the user should send its message with the claim policy as done throughout file creation. The cloud verifies the claim policy and oncondition that the user is authentic and it is allowed to write down on the file. D. User revocation: It should be guaranteed that clients ought not to have the adaptability to get to data. Regardless of they have
4 coordinating bargain of qualities. Thus, the proprietor has to change the droop on data and send redesigned information to different clients. The arrangement of individuality will be controlled by the disavowed client is noted and each one clients change their hang on data that have characteristics i Iu. In accusation afraid dynamically the overall population and mystery keys of the littlest arrangement of qualities that region unit expected to translate the information. We tend to don't believe this prejudice as an after effect of here very surprising data range unit encoded by a proportional arrangement of properties, so such a microscopic arrangement of individuality is entirely unexpected for different clients. For every such information record, the subsequent steps area unit then carried out: 1) A new value of s, snew Zq is selected. 2) The first entry of vector vnew is changed to new snew. 3) λx = Rxvnew is calculated, for each row x corresponding to leaf attributes in Iu. 4) C1,x is recalculated for x. 5) New value of C1,x is securely transmitted to the cloud. 6) New C0 = M e(g, g) snew is calculated and stored in the cloud. 7) New value of C1,x is not stored with the data, but is transmitted to users, who wish to decrypt the data. comparable prices to centralized approaches. The foremost valuable operations involving pairings and is done by the cloud. If we tend to compare the computation load of user during browse we tend to see that our theme has comparable prices. Our scheme conjointly compares well with the opposite theme. 5 EXPERIMENTS 5.1 Experimental Results: New user has to register After successfully registering users, one master key will be generated for each user in kdc/keys folder. After successfully registering users, cloud space will be assigned for each user in cloud/cloud folder. After successfully registering the users: 4.COMPARISON WITH OTHER ACCESS CONTROL SCHEMES IN CLOUD We compare our theme with alternative access management schemes (in Table III) and show that our theme supports several options that the opposite schemes failed to support. 1-W-M-R implies that only one user will write whereas several users will browse. M-W 10 M-R implies that several users will write and browse. We tend to see that most schemes don't support several writes that is supported by our theme. Our theme is powerful and decentralised, most of the others square measure centralized. Our theme conjointly supports privacy preserving authentication, that isn't supported by others. Most of the schemes don't support user revocation, that our theme does. We tend to compare the computation and communication prices incurred by the users and clouds and show that our distributed approach has We have given the access permission for the age 25, 30 and 35. Age 25 people accessing the data:
5 6.CONCLUSION We have given a localised access management technique with anonymous authentication, that has user revocation and prevents replay attacks. The cloud does not perceive the identity of the user World Health Organization stores information, but entirely veri fies the user s credentials. Key distribution is completed terribly} very localised approach. One limitation is that the cloud is awake to the access policy for each record keep at intervals the cloud. In future, we want to cover the attributes and access policy of a user. REFERENCES [1] S. Ruj, M. Stojmenovic and A. Nayak, Privacy Preserving Access Control with Authentication for Securing Data in Clouds, IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp , [2] C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou, Toward Secure and Dependable Storage Services in Cloud computing, IEEE T. Services Computing, vol. 5, no. 2, pp ,2012. [3] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, Fuzzy keyword search over encrypted data in cloud computing, in IEEE INFOCOM., pp , [4] S. Kamara and K. Lauter, Cryptographic cloud storage, in Financial Cryptography Workshops, ser. Lecture Notes in Computer Science, vol Springer, pp , [5] H. Li, Y. Dai, L. Tian, and H. Yang, Identity-based authentication for cloud computing, in CloudCom, ser. Lecture Notes in Computer Science, vol Springer, pp ,2009. [6] C. Gentry, A fully homomorphic encryption scheme, Ph.D. dissertation,stanford University, 2009, [7] A.-R. Sadeghi, T. Schneider, and M. Winandy, Token-based cloud computing, in TRUST, ser. Lecture Notes in Computer Science, vol Springer, pp ,2010. [8] R. K. L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg,Q. Liang, and B. S. Lee, Trustcloud: A framework for accountability and trust in cloud computing, HP Technical Report HPL Available at l. [9] R. Lu, X. Lin, X. Liang, and X. Shen, Secure rovenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing, in ACM ASIACCS,pp , [10] D. F. Ferraiolo and D. R. Kuhn, Role-based access controls, in 15 th National Computer Security Conference, [32] M. Chase and S. S. M. Chow, Improving privacy and security in multiauthority attribute-based encryption, in ACM Conference on Computer and Communications Security, pp , [26] A. Sahai and B. Waters, Fuzzy identity-based encryption, in EUROCRYPT, ser. Lecture Notes in Computer Science, vol Springer, pp , [27] V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in ACM Conference on Computer and Communications Security, pp , [29] X. Liang, Z. Cao, H. Lin and D. Xing, Provably Secure and Efficient Bounded Ciphertext Policy Attribute Based Encryption, in ACM ASIACCS, pp , [35] A. B. Lewko and B. Waters, Decentralizing attribute-based encryption, in EUROCRYPT, ser. Lecture Notes in Computer Science, vol Springer, pp , [30] M. Chase, Multi-authority attribute based encryption, in TCC, ser. Lecture Notes in Computer Science, vol Springer, pp , [31] H. Lin, Z. Cao, X. Liang and J. Shao, Secure Threshold Multi-authority Attribute Based Encryption without a Central Authority, in INDOCRYPT, ser. Lecture Notes in Computer Science, vol. 5365, Springer, pp , [28] J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, in IEEE Symposium on Security and Privacy., pp , 2007.
A Procedural Based Encryption Technique for Accessing Data on Cloud
A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,
More informationAttribute Based Encryption with Privacy Protection in Clouds
Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India
More informationAttribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds M. Suriyapriya 1, A. Joicy 2 PG Scholar 1 Assistant Professor CSE Department 2 St.Joseph College of Engineering Sriperumbudur, Chennai-602105
More informationDecentralized Access Control of Data Stored In Cloud Using Encryption
Decentralized Access Control of Data Stored In Cloud Using Encryption Mahjabeen PG Scholar, Computer Science and Engineering, Bheema institute of Technology and Science, ABSTRACT: We propose a new decentralized
More informationDecentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav
Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Abstract: Distributed computing is area that permits clients to store the information. Distributed
More informationDecentralized Access Control scheme for secure Data Stored in Clouds. Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College
Vol. I, Special Issue I, August 2015 in association with VEL TECH HIGH TECH DR. RANGARAJAN DR. SAKUNTHALA ENGINEERING Decentralized Access Control scheme for secure Data Stored in Clouds 1Antorose,2Sharmila,3Vijayavahini
More informationISSN Vol.04,Issue.05, May-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG
More informationA Novel Distributed Access Control of Data Stored Clouds through Anonymous Authentication
A Novel Distributed Access Control of Data Stored Clouds through Anonymous Authentication Chandriga.C M.Tech Student, Department of Computer Science and Engineering, VEMU Institute of Technology, Pakala,
More informationMulti Attribute Based Security and Key Distribution for Secure Storage in Clouds
International Journal of Computing Science and Information Technology, 2013, Vol.3 Iss. 1,19-25 ISSN: 2278-9669, Janaury 2015 (http://ijcsit.org) Multi Attribute Based Security and Key Distribution for
More informationSecure Data Storage in Clouds by Using Decentralized Access Control Scheme
Secure Data Storage in Clouds by Using Decentralized Access Control Scheme N. Suneel Kumar 1, A. NarayanaRao 2 M.Tech., (Ph.D.) 1 Computer Science and Engineering, Shree Institute of Technical Education
More informationDATA SECURITY IN CLOUDS USING DECENTRALIZED ACCESS CONTROL, ANONYMOUS AUTHENTICATION AND RSA BASED ENCRYPTION
DATA SECURITY IN CLOUDS USING DECENTRALIZED ACCESS CONTROL, ANONYMOUS AUTHENTICATION AND RSA BASED ENCRYPTION 1 VARALATCHOUMY.M, 2 PRATEEK. S. BHARADWAJ, 3 R. ROHITH, 4 NAGACHANDRA. K. P, 5 PRAVEEN. M
More informationISSN: (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationDecentralized Access Control with Anonymous Authentication of Data Stored in Clouds
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds K.Shravan Naidu Department of Computer Science and Engineering Vignana Bharathi Institute of Technology, Aushapur, Ghatkesar,
More informationDecentralized Access Control Based Crime Analysis
International Journal of Computer Systems (ISSN: 2394-1065), Volume 03 Issue 02, February, 2016 Available at http://www.ijcsonline.com/ a Badhusha S, a Chippy Raju, a Dhanya V.S, a Nazila A.N, a Syamini
More informationImplementation of Decentralized Access Control with Anonymous Authentication in Cloud
Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 210-214 Implementation of Decentralized Access Control with Anonymous Authentication in Cloud
More informationEnhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms
Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,
More informationAshok Nagasai et al., International Journal of Computer Engineering In Research Trends Volume 2, Issue 11, November-2015, pp.
ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org Revocable Data Access Control in Public Cloud 1 ASHOK NAGASAI MANCHALLA, 2 D.RAVIKIRAN
More informationAn Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara
An Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara 1 M.Tech, Dept of CSE,Shri Shirdi Sai Institute of Science and Engineering, Affiliated
More informationEFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE
EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,
More informationDECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE
DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE ABSTRACT We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority
More informationA compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography
More informationResult Analysis: Decentralized Access Control with Anonymous Authentication
Result Analysis: Decentralized Access Control with Anonymous Authentication Prof D.S.Thosar 1, Punam S.Jadhav 2,Shruti S.Thosar 3,Swapnali D.Sarode 4 1 Assistant Prof. Computer Department, 2,3,4 Student
More informationAbstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp
Vol.2, No.2, June 30 (2016), pp. 35-41 http://dx.doi.org/10.21742/apjcri.2016.06.05 1) 2) Abstract Cloud computing gives an adaptable and helpful route for information sharing, which brings different advantages
More informationA Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing
A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing P. Likitha Department of Computer Science and Engineering, MJR College of Engineering & Technology, Piler, A.P - 517214, India. ABSTRACT:
More information384 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014
384 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Sushmita Ruj, Member, IEEE,
More informationUser Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe
User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe T.Radhika 1, S.Vasumathi Kannagi 2 P.G.Scholar, Department of CSE, Info Institute of Engineering, Coimbatore, India 1 Assistant
More informationA Review: Data Security in Cloud via Decentralized Access Control Technique
A Review: Data Security in Cloud via Decentralized Access Control Technique Ashwini.S. Kale mone.ashwini@gmail.com Niraj N. Kasliwal kasliwaln@gmail.com Deepika A. Kadale deepikakadale@gmail.com Vaibhav
More informationA LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE
A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar 1 PG Student, INFO Institute of Engineering,
More informationHIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES
HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent
More informationEfficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage
Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage Mr. Ramesh 1, Prof. Girish Kumar D 2, Student, M.tech(Computer Networking) 1,, Assistant Professor, Computer
More informationIMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING
IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health
More informationAssistant Professor, Dept of CSE, Vasireddy Venkatadri Institute of Technology (VVIT), Nambur (v), Guntur, Andhra Pradesh, India
Volume 5, Issue 10, October-2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Efficient User
More informationROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL
ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL S.Vijaya Madhavi 1, G.Rama Subba Reddy 2 1 M.tech Scholar (CSE), 2 Headof Department (CSE), Vignana Bharathi
More informationENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2,
ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2, DEPARTMENT OF CSE SAHAJA INSTITUTE OF TECHNOLOGY & SCIENCES FOR WOMEN, KARIMNAGAR ABSTRACT: The
More informationAoT: Authentication and Access Control for the Entire IoT Device Life-Cycle
AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle Noura Alomar November 7th, 2018 1 AoT The AoT paper is one of the earliest and most cited papers on IoT defense and it considers
More informationFAC-MACS: Fortified Access Control for Multi-Authority Cloud Storage Using CPABE
FAC-MACS: Fortified Access Control for Multi-Authority Cloud Storage Using CPABE Bhuvaneswari Thangaraj 1, S.Umarani 2, D.Sharmila 3 1 PG scholar, Maharaja Engineering College, Avinashi, India 2 Assistant
More informationFortified and Revocable Access Control for Multi- Authority Cloud Storage using CPABE
Fortified and Revocable Access Control for Multi- Authority Cloud Storage using CPABE Bhuvaneswari Thangaraj PG scholar, Maharaja Engineering College, Avinashi, India, S. Umarani Assistant Professor, Maharaja
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 05, May -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 PRIVACY-PRESERVING
More informationSecure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption
Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud
More informationSharing of PHR s in Cloud Computing
86 Sharing of PHR s in Cloud Computing Dussa Manasa K.Rajesh Khanna In Cse Dept, Vaagdevi Engineering college, Warangal, Andhra Pradesh, India Abstract Personal health records (PHRs) grant patients access
More informationSecurity Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13
Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Payal Chaudhari, Manik Lal Das, Anish Mathuria DA-IICT, Gandhinagar, India {payal chaudhari, maniklal das, anish mathuria}@daiict.ac.in
More informationSession Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption
More informationAdvanced Searchable Encryption Scheme for Secure Data Sharing in Cloud
Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud Anusha K 1, Babitha M N 2 PG Student, Department of Computer Science & Engineering, SSIT, Tumakuru, Karnataka, India 1 Assistant Professor,
More informationENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM
ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM Ms. S. P. Vidhya Priya 1, Dharani.N.R 2, Gokilavani.M 3, Jeevitha.R 4 1,2,3,4 Department of Information Technology, Kathir College
More informationSecure Cloud Storage Using Decentralized Access Control with Anonymous Authentication
Secure Cloud Storage Using Decentralized Access Control with Anonymous Authentication S.Raghavendra PG Scholar, Department of CSE, Kasireddy Narayan Reddy College of Engineering & Research, Hayathnagar.
More informationManagement of Heterogeneous Data Storage Using Deduplication in Cloud Computing
Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing 1 Naveen Kumar.B 2 Mr.Praveen Babu.G 1 M.Tech Student, Software Engineering, School of Information Technology JNTUH, Village
More informationDAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems
1790 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 11, NOVEMBER 2013 DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems Kan Yang, Associate Member,
More informationDecentralized Access Control with Anonymous Authentication of Data Stored in Cloud
Decentralized Access Control with Anonymous Authentication of Data Stored in Cloud Abstract: We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments.
More informationPRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.
Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS
More informationFine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing
wwwijcsiorg 10 Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing Yinghui Zhang 12 1 National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications
More informationABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid
More informationUNSIGNED AUTHENTICATION WITH DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD
UNSIGNED AUTHENTICATION WITH DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD Teneti Padma 1, D. Nethaji Babu 2, Prof.S.V.Achutha Rao 3 1 Pursuing M.Tech (CSE), 2 Assistant Professor, 3 Professor &
More informationTime-Based Proxy Re-encryption Review
Time-Based Proxy Re-encryption Review Meghatai Maruti Bhoite 1, I Govardhan Rao 2 CSE, University College of Engineering Osmania University, Hyderabad, India Abstract :- Fundamentals approach for secure
More informationExploration Encryption Mechanism Using Single Key for Public Cloud Storage
International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 DOI: http://dx.doi.org/10.18535/ijetst/v3i05.07 Exploration Encryption Mechanism Using Single Key for Public Cloud
More informationInsecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme
2014 Tenth 10th International Conference on Computational Intelligence and Security Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme Changji Wang, Haitao
More informationOn the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data
On the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data Alfredo Rial Interdisciplinary Centre for Security, Reliability and Trust (SnT) University of Luxembourg
More informationEfficient Auditable Access Control Systems for Public Shared Cloud Storage
Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,
More informationImplementation of IBE with Outsourced Revocation technique in Cloud Computing
Implementation of IBE with Outsourced Revocation technique in Cloud Computing M.MOHANRAO, POCKLA PAVANI Assistant Professor, M.TECH STUDENT Dept of CSE,Megha Institute of Engineering & Technology For womens,edulabad,ghatkesar
More informationMilitary Secured Network Data Transmission
Military Secured Network Data Transmission Shubham Jain 1, Umesh Dusane 2, Smita Lokhande 3, Vinod Kadam 4, Asst. Prof. Neha Jamdar 5 1University of Pune, Sinhgad Institute of Technology and Science, jains7272@gmail.com
More informationFINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA
FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA 1 M MOUNIKA 1 M.Tech Student, Department of CSE, Jyothishmathi institute of Technology & science, karimnagar,
More informationAttribute-based encryption with encryption and decryption outsourcing
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing
More informationIJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 10, 2015 ISSN (online):
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 10, 2015 ISSN (online): 2321-0613 Determining Security and Efficiency of PHR using Different Algorithms with Attribute
More informationAN EFFICIENT USER REVOCABLE STORAGE IDENTITY BASED ENCRYPTION WITH PROTECTED DATA DISTRIBUTION IN CLOUD COMPUTING
AN EFFICIENT USER REVOCABLE STORAGE IDENTITY BASED ENCRYPTION WITH PROTECTED DATA DISTRIBUTION IN CLOUD COMPUTING Vanaparthi Hari Priya 1, A.Sanjeeva Raju 2, G.Deepak 3 1 Pursuing M.Tech (CSE), 2 Working
More informationSecure Cloud-based Access Control Optimization (SCACO)
Indian Journal of Science and Technology, Vol 9(37), DOI: 10.17485/ijst/2016/v9i37/102112, October 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Secure Cloud-based Access Control Optimization
More informationABSTRACT I. INTRODUCTION
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationEFFICIENT REVOCATION AND SECURE ATTRIBUTE-BASED PROXY RE-ENCRYPTION SCHEME
EFFICIENT REVOCATION AND SECURE ATTRIBUTE-BASED PROXY RE-ENCRYPTION SCHEME MAHESH S. GUNJAL 1, Dr. B. L. GUNJAL 2 1PG Student, Dept. of Computer Engineering, AVCOE, Maharashtra, India 2Associate Professor,
More informationUsing Circuit Cipher text-policy Hybrid Encryption with Data Sharing in Cloud Computing
Using Circuit Cipher text-policy Hybrid Encryption with Data Sharing in Cloud Computing K.Moulika, S. Neelima, Dr.Ch.N.Santhosh Kumar 1 M-Tech, Dept. of CS, SwarnaBharthi Institute Of Science and Technology
More informationEnhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage
Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Reliable Proxy
More informationISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department
More informationADVANCES in NATURAL and APPLIED SCIENCES
ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy
More informationMULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY
ISSN: 0976-3104 SPECIAL ISSUE Jayanthi and Prabadevi RESEARCH OPEN ACCESS MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY Jayanthi M.* and Prabadevi School of Information Technology
More informationSECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE STORAGE IDENTITY BASED ENCRYPTION
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE STORAGE IDENTITY BASED ENCRYPTION 1 K.Uma, 2 A.Mahesh. 1 Pursuing M.Tech (CSE), 2 Working as an Assistant Professor, Department of CSE, Visvesvaraya
More informationVarious Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi 2 M. Navinkumar 3
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Various Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi
More informationThree Levels of Access Control to Personal Health Records in a Healthcare Cloud
Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United
More informationAES and DES Using Secure and Dynamic Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationSecure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been
More informationA NEW TECHNIQUE FOR SECURE INFORMATION PART-TAKING IN CLOUD
A NEW TECHNIQUE FOR SECURE INFORMATION PART-TAKING IN CLOUD 1 J Laxman Naik, 2 Syed Amreen, 3 Dr. Bhaludra Raveendranadh Singh 1 Pursuing M. Tech (CSE), 2 Assistant Professor, 3 Professor& Principal, 1,2,3
More informationA NEW FRAMEWORK FOR PROVABLE FEATURES BASED KEYWORD SEARCH OUTSOURCED ENCRYPTED DATA FINAL
A NEW FRAMEWORK FOR PROVABLE FEATURES BASED KEYWORD SEARCH OUTSOURCED ENCRYPTED DATA FINAL M.Divyalakshmi 1, D.Rambabu 2 1 Pursuing M.Tech, 2 Associate Professor, Holy Marry Institute of Technology & Sciences
More informationA Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach
A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach Mr Vaibhav Sawalkar 1,Prof.Megha Singh 2 1 MTECH Student,Dept of Computer Science, CIIIT
More informationEfficient Generation of Linear Secret Sharing. Scheme Matrices from Threshold Access Trees
Efficient Generation of Linear Secret Sharing 1 Scheme Matrices from Threshold Access Trees Zhen Liu, Zhenfu Cao, and Duncan S. Wong Abstract Linear Secret Sharing Scheme (LSSS) matrices are commonly used
More informationKeywords: Multi-authority attribute based encryption, key policy, ciphertext policy, central authority free
Computing and Informatics, Vol. 35, 2016, 128 142 SIMPLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION FOR SHORT MESSAGES Viktória I. Villányi Department of Operations Research ELTECRYPT Research Group Eötvös
More informationHomomorphic encryption (whiteboard)
Crypto Tutorial Homomorphic encryption Proofs of retrievability/possession Attribute based encryption Hidden vector encryption, predicate encryption Identity based encryption Zero knowledge proofs, proofs
More informationA Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data
A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data Purva Jain 1, Dr. Abhijit Banubakode 2 ( Computer, RSCOE, University of Pune, Pune, Maharashtra India) 1 ( I.T., RSCOE, University
More informationMulti-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1
Multi-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1 M.Tech Student, Department of CSE, Narasaraopet Engineering College, Narasaraopet Guntur dist,
More informationA Survey on Secure Sharing In Cloud Computing
A Survey on Secure Sharing In Cloud Computing Aakanksha maliye, Sarita Patil Department of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India ABSTRACT: Cloud computing
More informationMANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY
MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY GARNEPALLI MOUNIKA 1, N.SANTHOSH RAMCHANDER 2 M. Tech Student, CSE, SVS Group of Institutions, Warangal, TS 1 M.Tech (Ph.D) Assoc. Prof, CSE Dept,
More informationA Two-Fold Authentication Mechanism for Network Security
Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1
More informationVolume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article /
More informationHierarchical Attribute Based Revocable Data Access Control For Multi Authority Cloud Storage
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 4, Ver. I (Jul - Aug 2017), PP 91-97 www.iosrjournals.org Hierarchical Attribute Based Revocable Data
More informationSecure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing
ISSN No: 2454-9614 Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing *Corresponding Author: D. Vaduganathan E-mail:vaduganathan.kce@gmail.com D. Vaduganathan a a)
More informationSECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA
Research Manuscript Title SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA Dr.B.Kalaavathi, SM.Keerthana, N.Renugadevi Professor, Assistant professor, PGScholar Department of
More informationDAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems Kan Yang, Xiaohua Jia, Kui Ren Department of Computer Science, City University of Hong Kong, Email: kanyang3@student.cityu.edu.hk
More informationSecure and Flexible Data Sharing for Dynamic Groups in the Cloud
Secure and Flexible Data Sharing for Dynamic Groups in the Cloud Srinivas Tutigunta. 1, K. Ravi Chadaran 2 1 Dept. of CSE, Nova College of Engineering & Technology, Jangareddy Gudem, A.P, India 2 Associate
More informationOn the Security of Group-based Proxy Re-encryption Scheme
On the Security of Group-based Proxy Re-encryption Scheme Purushothama B R 1, B B Amberker Department of Computer Science and Engineering National Institute of Technology Warangal Warangal, Andhra Pradesh-506004,
More informationSecure Data Sharing in Cloud Computing: Challenges and Research Directions
Cyber Summer School Melbourne, 12-13 Feb 2018 Secure Data Sharing in Cloud Computing: Challenges and Research Directions Willy Susilo Institute of Cybersecurity and Cryptology School of Computing and Information
More informationImproved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User
Improved Third Party Auditing Approach For Shared Data In The Cloud With Efficient Revocation Of User Miss Madhuri Kulkarni PG Student, Dept. Of Computer Engineering, Alard Collage of Engineering and Management,
More informationPRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA
PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department
More informationSecure Data Deduplication with Dynamic Ownership Management in Cloud Storage
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Dr.S.Masood Ahamed 1, N.Mounika 2, N.vasavi 3, M.Vinitha Reddy 4 HOD, Department of Computer Science & Engineering,, Guru Nanak
More information