Abstract of Updating Policy with, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 131

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016


Updating Policy with Access Control Using Multi Authority in the Cloud

V. Kalpana | J. Daphney Joann


Abstract: The policy updating has always been a challenging issue when ABE is used to construct access control schemes and develop a new method to outsource the policy updating to the server. Attribute Based Access Control method is used to avoid the transmission of encrypted data and minimize the computation work of data owners, by making use of the previously encrypted data with old access policies. A policy updating algorithm called LSSS is used for efficient and secure method allows data owner to check whether the cloud server has updated the cipher texts correctly.


Keywords: Access Control, Policy Updating, Attribute based Encryption, Encryption-Decryption, Attribute Based Access control


Edition: Volume 5 Issue 2, February 2016,


Pages: 87 - 90


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

V. Kalpana, J. Daphney Joann, "Updating Policy with Access Control Using Multi Authority in the Cloud", International Journal of Science and Research (IJSR), Volume 5 Issue 2, February 2016, pp. 87-90, https://www.ijsr.net/get_abstract.php?paper_id=26011602

Similar Articles with Keyword 'Access Control'

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [12] | R. Sathya [8]

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 12, December 2024

Pages: 448 - 453

Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies

Dr. A. Lavanya

Share this Article
Top