Access Control and Revocation for Digital Assets on Cloud with Consideration for Sharing
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 5
Abstract
In cloud computing applications, users’ data and applications are hosted by cloud providers. With internet and cloud availability increasing numbers of people are storing their content on cloud. Also with presence of social networking, contents stored on cloud are also shared. This requires more security for the contents on cloud. Traditional security solution address only encryption, decryption of data on cloud and its access control , but with this new trend of sharing, the scope of security becomes even higher. In this paper we propose a solution of integrated access control for contents shared on cloud and its efficient revocation.
Authors and Affiliations
Prof. Sabera Begum, Mohd. Ghouse
Employee on Boarding Process Automation
On boarding, also known as organizational socialization, plays a vital role in building the initial relationship between an organization and an employee. It also contributes to an employees’ satisfaction, better performa...
Extracting Text from Image Document and Displaying Its Related Information
Image Text is the text information embedded or written in image of different form. Image text can be found in captured images, scanned documents, magazines, newspapers, posters etc. These image texts are highly available...
Effects of Machining Parameters on Cutting Forces during Turning of Hardened AISI 52100 Steel using PCBN Tooling
The motivation of this investigate is to study the effects of machining parameters on the cutting performance of hard turned parts with PCBN (polycrystalline cubic boron nitride) tools , in wholly dry cutting. The data o...
Analysis of Pseudo-range Measurements Observed in NavIC Receiver
The Indian Regional Navigation Satellite System (IRNSS), also known as NavIC- Navigation with Indian Constellation provides real time positioning and timing services. The NavIC receivers are placed in different regions....
A Comprehensive Analysis and Comparison of TCP Reno and TCP New Reno
There are different TCP variations and each one place with the different criteria. In the mobile ad hoc networks, the topology changes habitually due to mobile nodes, this leads to significant packet losses and network t...