Secured Image Sharing and Deletion in the Cloud Storage Using Access Policies

Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 4

Abstract

Cloud computing is a general term for anything that involves delivering hosted services, Anything as a Service (AaaS), over the web on demand basis. It uses web and central remote servers to maintain data and applications. Outsourcing data storage and maintenance to third-party cloud services reduces data management costs, but providing security guarantees is a major issue. In this approach, a secured cloud storage system that achieves policy-based access control and file assured deletion is proposed with an information accountability cloud framework to keep track of the actual usage of the clients’ data. Automated logging and distributed auditing of relevant access performed by any entity is handled. The access policy generated for the file controls the file accesses and policy revocation makes the file permanently inaccessible. The system is built upon a set of cryptographic key operations that are selfmaintained by a set of key managers and adds security features.

Authors and Affiliations

Nishana Rahim , K. Saravanan

Keywords

Related Articles

INCREASING THE EFFICIENCY OF THE SOFTWARE RCHITECTURE RECOVERY THROUGH SPANNING TREE BASED MAXIMAL GRAPH MINING TECHNIQUE

This paper represents a technique for recovering the Software Architecture based on Graph Pattern Matching by the help of mining techniques. enerally Software Architecture is represented in terms of graphs with set of...

AN INTELLIGENT APPROACH OF WEB DATA MINING

With an explosive growth of the World Wide Web, websites are playing an important role in providing an information and knowledge to the end users. Web usage patterns are an important aspect to discover hidden and meaning...

Visual Cryptographic Applications

Visual Cryptography is a special kind of cryptographic scheme where the decryption of the encrypted secret is done by the human vision and not by complex mathematical calculations. Visual Cryptography deals with any secr...

AN APPROACH ORIENTED TOWARDS ENHANCING A METRIC PERFORMANCE

Software Engineering like all other engineering professions has metrics and Software metrics are increasingly playing a central role in the planning and control of software development projects [2]. A software metric is...

CLASSIFICATION OF LAND USE LAND COVER CHANGE DETECTION USING REMOTELY SENSED DATA

Image classification is perhaps the most important part of digital image analysis. With supervised classification, the information classes of interest like land cover type image. These are called “training sites”. The im...

Download PDF file
  • EP ID EP120239
  • DOI -
  • Views 122
  • Downloads 0

How To Cite

Nishana Rahim, K. Saravanan (2013). Secured Image Sharing and Deletion in the Cloud Storage Using Access Policies. International Journal on Computer Science and Engineering, 5(4), 230-237. https://europub.co.uk/articles/-A-120239