Key-Aggregate Based Vulnerable Data Access Control in Cloud Computing
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 3
Abstract
In the developing technologies in the computers the cloud computing is one the way to provide services through the internet to the users in the efficient manner. Cloud based services not only provide users with convenience, but also bring many security issues. The user can store his data in the cloud service. Although cloud computing brings great convenience to enterprises and users, the cloud computing security has always been a major hazard. For users, it is necessary to take full advantage of cloud storage service, and also to ensure data privacy. The system proposed a fine-grained two-factor authentication (2FA) access control system, 2FA access control system, an attribute-based access control mechanism is implemented with the necessity of both user secret key and a BBS+ Signatures. The mechanism implemented using CP-IBE(cipher text identity based encryption) and digit signature authority, compare to existing method which provide the paranoid security and achieving the secure data access in cloud computing. Sowmiya. S | Dr. T. Priyaradhikadevi"Key-Aggregate Based Vulnerable Data Access Control in Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11633.pdf http://www.ijtsrd.com/engineering/computer-engineering/11633/key-aggregate-based-vulnerable-data-access-control-in-cloud-computing/sowmiya-s
A Case of Sheehan’s Syndrome: A Rare but Life - Threatening Complication
Hypopituitarism developing after severe post partum haemorrhage PPH is called Sheehan’s Syndrome. Sheehan described in 1937 developing in women after PPH. Sheehan’s Syndrome though rare and still one of the commonest...
A Review of Sensor Node in Wireless Sensor Networks
Wireless Sensor Networks WSNs are collection of tiny sensor nodes capable of sensing, processing and broadcasting data correlated to some occurrence in the network area. The sensor nodes have severe limitation, such as b...
Industrial Profile of Jammu & Kashmir State
Infrastructure development serves as an engine for industrial development and calls for continuous attention of the Government. Development of Industrial Estates Infrastructure is the major function of the Industries and...
Study on Solid Waste Management System and Design of Sanitary Landfill for Monywa Township
The description of this paper is "Study on Solid Waste Management System and Design of Sanitary Landfill for Monywa Township". It has mainly contained two portions. First, analysis of solid waste composition and disposa...
Numerical Analysis of Corrugated Type Heat Exchanger with Variation in Corrugation Angle
Heat transfer is one of the main concerns in industries. Corrugated type heat exchangers are one of the best options available for heat transfer in less space. Many researchers have worked for corrugated plate heat excha...