Downloads: 103 | Views: 327
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 6.4 / 10
Enhanced Retreat of Cloud Storage Data users by Using Improved Data Access Control Scheme for Multi-Authority Cloud Storage
Shafi Shaik, M. Geethalatha
Abstract: The number of user in cloud computing are increasing tremendously due to its advantage of providing flexible storage requirement. The users are started to share their sensitive information through the cloud due to its nature of providing convenience to users. The security of the data has to be assured to the users when storing their details into the cloud server. In the existing work an expressive, efficient and revocable data access control scheme for multi-authority cloud storage systems is proposed to support the authority access control get from the many attribute authorities. The users those who are having matching attributes as in the access policy defined in the cipher text can retrieve the entire data content. It aims to allow the users with eligible attributes to decrypt the entire data stored in the cloud server. However it cannot limit the users from accessing the datas which are not accessible to them. That is it cannot limit the data access control to the authorized users. In this work a novel algorithm namely Privacy enhanced Data Access Control Scheme is proposed to overcome the problem exist in the existing work. In the existing work data access control is limited to the user from the unauthorized users whereas in the proposed algorithm aim to limit the data access control to the authorized user
Keywords: access control, multi-authority, security, cloud storage
Edition: Volume 4 Issue 12, December 2015
Pages: 1736 - 1740
DOI: https://www.doi.org/10.21275/NOV152031
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 138 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1023 - 1029A Survey and High-Level Design on Human Activity Recognition
Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 642 - 647Face Liveness to Identify Between Actual Face and Spoof Face
Lovely Pal, Renuka Singh