Dynamic Access Control In Cloud Computing Using Encryption/Decryption
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 11
Abstract
Cloud computing has emerged as one of the most important paradigms in the IT industry for last few years. In general data owners and service providers are not in the same trusted domain in cloud computing. Service providers should not be a trusted one anyhow they are all third party. The system focuses on a novel technique to Hierarchical Attribute Set Based Encryption (HASBE); it is driven by the Cipher Policy attribute based encryption (CPABE) with a hierarchic al structure of cloud users. Cloud computing is known as “Utilityâ€. Cloud Computing enabling users to remotely store their data in a server and provide services on demand. Since this new computing technology requires user to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. We can increase security on access of the data in the cloud. Morever we can provide encryption on the data so third party can not use the data. In this paper we will be reviewing various encryption based access control model for enhancing cloud security along with their limitations. We will be concluding with a proposed access control model to enhance cloud security. The proposed work focuses CRM (Customer Relationship Management) for business model that is driven by the category of Software as a Service (Saas) method in cloud. Using this scheme it achieves the flexible, scalable and fine grained access control of data. It also achieves high secure and effective user revocation in cloud environment.
Authors and Affiliations
Ravindra R| Student of M.Tech (CSE) and Department of Computer Science Engineering, S Krishna Chaitanya R| Asst.Prof, Department of Computer Science and Engineering, Sir C R Reddy College of Engineering, Eluru, W.G.DIST
On-Chip AHB Bus Trace Analyzer for Real Time Tracing With Lossless Data Compression
The advanced micro controller bus Architecture (AMBA) is widely used as the on-chip bus in Systemon-Chip(SoC) designs. The important aspect of a SoC is not only which components or blocks it houses, but also how they...
The Wireless Mobile Network is work of "nodes"- from a couple to a few hundreds or even thousands, where every node is associated with one mobile. A node in a wireless mobile network that is equipped for using out so...
Optimal Object Placement Policies To Minimize The NetworkWide Content Provisioning Cost
Social Wireless Networks are formed by mobile devices such as data enabled phones, electronic book readers etc., allocating common interests in electronic content and physically gathering together in public places. E...
Dynamic Performance Analysis of BLDC Motor with Adaptive Neuro Fuzzy Controller Under Critical Load Condition
Brushless DC (BLDC) motors have been widely used in many fields of drives for their high power/weight, high torque, high efficiency, long operating life, noiseless operation, high speed ranges and ease of control. In...
Network Intrusion Detection Systems Using Genetic Algorithm
Intruder Detection system is so important implementations which considers all network information like temporal and spatial which make the system to build the rule for IDS. This helps for the administrator to detect...