HASBE: A Hierarchical Attribute Set Based Encryption For Flexible, Scalable And Fine Grained Access Control In Cloud Computing
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 9
Abstract
At present cloud computing is going to be very famous technology in IT enterprises. For a company, the data stored is huge and it is very precious. All functions are performed through networks. Thus, it becomes very important to have the secured use of data. In cloud computing, the ultimate important concerns of security are data security and confidentiality, and also flexible and scalable, fine grained access control must be keep in the cloud systems. Attribute based encryption (ABE), allows for rare access control on encrypted data. In its key policy extract, the primitive enables senders to encrypt messages under a set of attributes and private keys are associated with access structures that specify which cipher texts the key holder will be allowed to decrypt .we propose the Hierarchical Attribute Set Based Encryption (HASBE) to develop a new security feature for various organizational platforms. It is implemented using cipher text policy by encrypting and decrypting the data in the cloud so that the cloud system becomes more scalable and flexible by enforcing data owners to share their data with data consumers controlled by the domain authority.
Authors and Affiliations
N. krishna , L. Bhavani
Gradation of NGO’s Role in Rural Development: A Fuzzy Soft Set Theoretic Approach
The non-governmental organizations (NGO) are recognized as important institutional actors that are expected to facilitate the participation of beneficiaries in the development programmes such as mobilising communit...
Security Issues and Data Management In Cloud Computing
Cloud computing placed IT to higher and new limits by providing the market environment data storage and capacity with flexible and scalable and processing power to reach the demand and supply while reducing the capital e...
IRIS AUTHENTICATION USING PSO
The paper proposes a wavelet probabilistic neural network (WPNN) for iris biometric classifier. The WPNN combines wavelet neural network and probabilistic neural network for a new classifier model which will be...
A Simulation And Analysis Of Secured S-DSR Protocol In Mobile Ad Hoc Networks
AMANET is as pecial kind of wireless network, which can be treated as a collection of mobile nodes co-existing with each other without the need of any fixed infrastructure. Because of the limited physical security,...
Table Detection and Extraction from Image Document
Tables make information easier to understand and perceive than regular text block. Now days, it becomes popular structure for information representation. Format of tables differs and change according to need of rep...