Dynamic Access Control In Cloud Computing Using Encryption/Decryption
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 11
Abstract
Cloud computing has emerged as one of the most important paradigms in the IT industry for last few years. In general data owners and service providers are not in the same trusted domain in cloud computing. Service providers should not be a trusted one anyhow they are all third party. The system focuses on a novel technique to Hierarchical Attribute Set Based Encryption (HASBE); it is driven by the Cipher Policy attribute based encryption (CPABE) with a hierarchic al structure of cloud users. Cloud computing is known as “Utilityâ€. Cloud Computing enabling users to remotely store their data in a server and provide services on demand. Since this new computing technology requires user to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. We can increase security on access of the data in the cloud. Morever we can provide encryption on the data so third party can not use the data. In this paper we will be reviewing various encryption based access control model for enhancing cloud security along with their limitations. We will be concluding with a proposed access control model to enhance cloud security. The proposed work focuses CRM (Customer Relationship Management) for business model that is driven by the category of Software as a Service (Saas) method in cloud. Using this scheme it achieves the flexible, scalable and fine grained access control of data. It also achieves high secure and effective user revocation in cloud environment.
Authors and Affiliations
Ravindra R| Student of M.Tech (CSE) and Department of Computer Science Engineering, S Krishna Chaitanya R| Asst.Prof, Department of Computer Science and Engineering, Sir C R Reddy College of Engineering, Eluru, W.G.DIST
Data Mining with Big Data Using HACE Theorem
The term Big Data comprises large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidl...
Adopting Cloud Computing Technique for Efficient Event Forwarding Service To Users
Forwarding large volume of live content to relevant users in scalable efficient way in emergency application is main challenging task. One of the model named as the publisher and subscribe is used to forward the even...
Forecast-Founded Haze Bandwidth and Cost Decrease Scheme
In this paper, we present PACK (Predictive ACKs), a novel end-to-end traffic redundancy elimination (TRE) Scheme, designed for Haze computing customers. Haze-Founded TRE needs to apply a judicious use of Haze resourc...
Design And Implementation of Modular Multilevel Inverter With Reduced Number Of Components
In this paper, utilizing H-connect topology a general course multilevel inverter for the execution of 49th level inverter and another calculation in producing all voltage levels for a 49th level with less number of dc...
A Study on Big Data analysis Environment
The use of electronics to implement IT solutions has generally known about big data since recent century. IT was use full for compute a vast applications for implementing business processes, its value intention has a...