Proceedings ArticleDOI
Image management and data access control for Multi-authority cloud storage with use of certificate less encryption
Vitthal S. Gutte,Amol N. Jadhav,Pramod Mundhe +2 more
- pp 64-67
TLDR
This work uses certificate less encryption-based schemes by relying on a public cloud server and applies it as underlying techniques to design the data users and data access control scheme in process to provide not only forward security but also backward security with more efficient way.Abstract:
Cloud computing technologies getting importance with a high level in security concern. In a domain of private, public or government organization. It shows new aspect for transparency. The main issue that Cloud computing provides transparency, but sharing of resources at different level in distributed scheme has severe implications. When at sensitive or privacy-relevant data is concerned for most secure challenging task. In cloud computing ensure the data security in data access control is an effective way. The problem with unsecured cloud servers or the untrusted cloud servers, data access control to various vendors becomes a challenging and most unsecured issue in cloud storage systems in these days. However after user's data or attribute revocation if we have to show the more security through re-encryption process. In the proposed method we uses certificate less encryption-based schemes by relying on a public cloud server. We have applied it as underlying techniques to design the data users and data access control scheme in process. We came to know that our certificate less encryption method can efficiently provide not only forward security but also backward security with more efficient way.read more
Citations
More filters
Journal Article
Survey on access control techniques in cloud computing
sushmitha B.R,Prabodh C.P +1 more
TL;DR: A far reaching audit of access control components utilized in the distributed computing condition is presented and the preferences and weaknesses of every one of these models are talked about and introduced alongside their examination.
References
More filters
Journal ArticleDOI
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
TL;DR: A novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers are proposed and a high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE.
Proceedings ArticleDOI
Improving privacy and security in multi-authority attribute-based encryption
Melissa Chase,Sherman S. M. Chow +1 more
TL;DR: This paper proposes a solution which removes the trusted central authority, and protects the users' privacy by preventing the authorities from pooling their information on particular users, thus making ABE more usable in practice.
Journal ArticleDOI
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
Kan Yang,Xiaohua Jia +1 more
TL;DR: This paper designs an auditing framework for cloud storage systems and proposes an efficient and privacy-preserving auditing protocol, which is efficient and provably secure in the random oracle model and extends the protocol to support the data dynamic operations.
Journal ArticleDOI
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
Kan Yang,Xiaohua Jia +1 more
TL;DR: This paper designs an expressive, efficient and revocable data access control scheme for multi-authority cloud storage systems, where there are multiple authorities co-exist and each authority is able to issue attributes independently.
Proceedings ArticleDOI
Public auditing for shared data with efficient user revocation in the cloud
Boyang Wang,Baochun Li,Hui Li +2 more
TL;DR: A novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind is proposed, which allows the cloud to re-sign blocks on behalf of existing users during user revocation, so that existing users do not need to download and re-signed blocks by themselves.
Related Papers (5)
Data Security in Unreliable Cloud Using Access Control and Access Time
Pooja A. Uplenchwar,L. H. Patil +1 more