A Brief Survey on Encryption Schemes in Cloud Environments
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 9
Abstract
For the last two years cloud computing is a important in the IT industry. In cloud computing data owners and service providers are not in the same trusted domain so the Service providers should not be a trusted one and they are all third party.It focuses on a technique to Hierarchical Attribute Set Based Encryption (HASBE); it is proposed by the Cipher Policy attribute-based encryption (CP-ABE). It achieves both flexibility and fine-grained access control of data in cloud not only the scalability. It stores the data in encrypted form for privacy protection. Cloud system is responsible for both tasks on storage and encryption or decryption of data. In this paper I provide a technique called Hierarchical Attribute set based Encryption(HASBE) to give security and fine grained access control to the users of cloud computing. It was an enhancement for the technique called Attribute based Encryption(ABE) which is inflexible to handle comple x control.
Authors and Affiliations
S. M . Hema Latha , S. Ganesh
ALL-EMBRACING REVIEW OF WIRELESS NETWORK PROTOCOL,OPTIMUM NETWORK SIMULATOR
Wireless connectivity is the new murmur utterance in computer networks. It involves connecting laptops, mobile libraries and even fridges to computer networks, without physical wire connections. Wireless connectivi...
Security requirements in Software Requirements Engineering
In the last few decades, software projects have encountered major difficulties. Most software engineering projects tend to be late and over budget. Several of the causes of these failures are related to requirement...
Effect of Couple Stress Fluid on Peristaltic Motion in a Uniform and Non-Uniform Annulus
Peristalsis is now well known to physiologists to be one of the major mechanisms for fluid transport in many biological systems. In particular, a mechanism may be involved in swallowing food through the esophagus, in uri...
Packet Mark Methodology for Reduce the Congestion in the Network by using the Code Field in the TCP/IP header
Congestion is one of the major problems of a communication network in routing. The function of a routing is to guide packets through the communication network to their correct destinations. Every router receives the pack...
A Novel Encryption approach in Database Security
Database servers are the most important thing in company environment. They store client details, financial information, human resource details and all the data are should be keptas very secret. Database security&nb...