A Brief Survey on Encryption Schemes in Cloud Environments

Abstract

For the last two years cloud computing is a important in the IT industry. In cloud computing data owners and service providers are not in the same trusted domain so the Service providers should not be a trusted one and they are all third party.It focuses on a technique to Hierarchical Attribute Set Based Encryption (HASBE); it is proposed by the Cipher Policy attribute-based encryption (CP-ABE). It achieves both flexibility and fine-grained access control of data in cloud not only the scalability. It  stores the data in encrypted form for privacy protection. Cloud system is responsible for both tasks on storage and encryption or decryption of data. In this paper I provide a technique called Hierarchical Attribute set based Encryption(HASBE) to give security and fine grained access control to the users of cloud computing. It was an enhancement for the technique called Attribute based Encryption(ABE) which is inflexible to handle comple x control.

Authors and Affiliations

S. M . Hema Latha , S. Ganesh

Keywords

Related Articles

Image Registration Methods and Validation Techniques

Image registration is the process of aligning two or more images into a common coordinate system. The images can be of the same object taken at different time instants or angles or by different sensors. The images can al...

Analysis of Popular Steaming Algorithms Supporting Information Retrieval System

Information retrieval is the activity of gaining information resources significant to an information need from a collection of information resources. Searches can be based on metadata a . Computerized information retriev...

A Survey Of Key Management Schemes In Wireless Sensor Networks

In near future, the Wireless Sensor Networks (WSN) is widely used in many applications like military and civil domains. The wireless sensor networks are always deployed in hostile and pervasive environment. Security is m...

The Impact of ICT on Cost Efficiency in Higher Institutions in Nigeria

The research work focused on the impact of ICT on cost efficiency in higher institutions in Nigeria. Primary data was used as data. The researcher designed well structured questionnaires, which was distributed and return...

 DAEMON Decisional Access in Emission Mechanism Of Networks

 The Decisional access method of mining is a process of retrieving data with some assumption decision from the data bases which are inter connected with databases Many of the organizations are providing design of th...

Download PDF file
  • EP ID EP99161
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

S. M . Hema Latha, S. Ganesh (2013). A Brief Survey on Encryption Schemes in Cloud Environments. International Journal of Computer & organization Trends(IJCOT), 3(9), 374-378. https://europub.co.uk/articles/-A-99161