Prevention of Sensitive Information by Enhancing Cloud Access Control

Abstract

the scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication, and storage overheads are comparable to centralized approaches. To better protect data security, this paper makes the first attempt to formally address and which are centralized. The communication, computation access control scheme is decentralized and robust; unlike other access control schemes designed for clouds the problem of authorized data. Different from traditional existing systems, the differential privileges of users are further considered in duplicate check besides the data itself by encrypting the file with differential privilege keys. Unauthorized users cannot decrypt the cipher text even collude with the SCSP. Security analysis of the definitions specified in the demonstrates that our system is secure in terms proposed security model.

Authors and Affiliations

SwamyMandapaka| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: swamy1209@gmail.com, D. Ramesh| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India

Keywords

Related Articles

Pesticide Toxicity Classification using Data Mining Techniques

Agriculture is the main occupation of our working population in India. The techniques and strategies used in agriculture since ancient times varied with many different civilizations. As time varied, the attitude towar...

Virus Attack Identification And Representation In Sensor Network

Clusters consist of circulated sensors and motor that interact with each other via wireless network. The use of open wireless intermediate and unattended deployment leaves these systems vulnerable to intelligent adve...

Enhanced Path Reconstruction with Security in WSN

Late remote sensor systems are winding up noticeably progressively complex with the developing system scale and the dynamic way of remote interchanges. Numerous estimation and analytic methodologies rely on upon per-...

A Novel Subset Selection Clustering-Based Algorithm for High Dimensional Data

Feature selection, also known as variable selection, attribute selection or variable subset selection, is the process of selecting a subset of relevant features (variables, predictors) for use in model construction....

Urdhva Tiryagbhyam Sutra Multiplier Based 32-Bit MAC Design

The Vedic Multiplier and the Reversible Logic Gates has Designed and actualized in the increase and Accumulate Unit (MAC) and that is appeared in this paper. A Vedic multiplier is composed by utilizing Urdhava Triyag...

Download PDF file
  • EP ID EP16704
  • DOI -
  • Views 292
  • Downloads 10

How To Cite

SwamyMandapaka, D. Ramesh (2015). Prevention of Sensitive Information by Enhancing Cloud Access Control. International Journal of Science Engineering and Advance Technology, 3(12), 1379-1386. https://europub.co.uk/articles/-A-16704