Confidential Data with Safeguard Access Control in distributed Cloud Computing

Abstract

Cloud computing is a safeguard technology which means that privileging permissions for the users and stowing of data on world wide web. Mainly cloud computing focus on Protection and mystery represent major concerns in the acceptance of cloud technologies for data insertions . A major issue is how to safe access control policies such that 2 layer encryption can be achieved internally. Solve these problem by using this proposed in the decentralization process in two layer broadcast encryption schema, by eliminate the group manager preliminary unit of the set, with an advantage of the addition of supporting members to the coordination, does not want any central authorization. Our model is represent AES method for secrecy data management purpose and it will provide accuracy data for authorised person only .That person get main key for access the data this key will be produced by key generation algorithm. In this we are having like search engine. This engine defends on cloud previous engines not provide accurate info and also previous technologies provides inaccurate info and secure data retrieved unauthorised also. Our coordination assures the confidentiality of the data and preserves the privacy of users from the cloud although delegating most of the access power enforcement to the cloud. Existing market inclination need Products to be developed at elevated swiftness. To meet those requirements sometimes it requires collaboration between the organizations. Since of the proficient services that are being obtainable by the cloud service providers today, lots of business organizations started compelling advantage of cloud services. Specifically, Cloud computing enables a new form of service in that a service can be realized by components provided by different enterprises or entities in a collaborative manner. Contributing parties are commonly loosely connected and they are responsible for managing and protecting resources/data consign to them. Such situation demands advanced and modern mechanisms for better security and privacy protection of data shared among multiple participating parties. In this, we are presented access control policy. This policy is included priveligation function and accurate info function. Our contribution is mainly focus on assures the confidentiality of the data and preserves the privacy of users.

Authors and Affiliations

Kota Anusha| Student of M.Tech (CSE) and Department of Computer Science and Engineering, St.Marys Group Of Institution, Guntur , K L V G K Murthy| Asst.Prof, Department of Computer Science and Engineering, St.Marys Group Of Institution, Guntur

Keywords

Related Articles

GSM & GPS Integrated With ARM Based Event Data Recorder for Accident Detection

Main concentration of this project is to find out the vehicle which is met with an accident by using MEMS sensor and GPS, GSM.Vehicle tracking system is one of the hot topics in embedded systems industry. In this pro...

A Two Layer Secure Data Search with Bilinear Map and AES over Cloud

Multikeyword search over cloud is an interesting research issue in the field of knowledge and data engineering of cloud computing. Various researchers proposed various solutions to upload and process documents over c...

A Study on Goodness of Fit For The Linear Model of Index Numbers of Jute Productivity In India

A linear trend is fitted to the index numbers of Jute productivity in India from 1993-94 to 2011-12. The line is tested for its goodness of fit by studying standard error, closeness of fit, confidence region, and som...

Optimal Clustering Approach Used For Concurrent Probabilistic Graphs

To tackle the testing issue two calculations, in particular the PEEDR and the CPGS bunching calculation are characterized for each of the proposed calculations, and after that likewise characterize in the ballpark of...

Improved Converter Design Use of SHE-PWM for Harmonic Immunity in VSC HVDC Transmission

The idea of multilevel inverters, presented around 20 years back involves performing power change in various voltage ventures to get enhanced force quality, lower exchanging misfortunes, better electromagnetic simila...

Download PDF file
  • EP ID EP16564
  • DOI -
  • Views 323
  • Downloads 10

How To Cite

Kota Anusha, K L V G K Murthy (2015). Confidential Data with Safeguard Access Control in distributed Cloud Computing. International Journal of Science Engineering and Advance Technology, 3(9), 542-546. https://europub.co.uk/articles/-A-16564