scispace - formally typeset
Proceedings ArticleDOI

Image management and data access control for Multi-authority cloud storage with use of certificate less encryption

TLDR
This work uses certificate less encryption-based schemes by relying on a public cloud server and applies it as underlying techniques to design the data users and data access control scheme in process to provide not only forward security but also backward security with more efficient way.
Abstract
Cloud computing technologies getting importance with a high level in security concern. In a domain of private, public or government organization. It shows new aspect for transparency. The main issue that Cloud computing provides transparency, but sharing of resources at different level in distributed scheme has severe implications. When at sensitive or privacy-relevant data is concerned for most secure challenging task. In cloud computing ensure the data security in data access control is an effective way. The problem with unsecured cloud servers or the untrusted cloud servers, data access control to various vendors becomes a challenging and most unsecured issue in cloud storage systems in these days. However after user's data or attribute revocation if we have to show the more security through re-encryption process. In the proposed method we uses certificate less encryption-based schemes by relying on a public cloud server. We have applied it as underlying techniques to design the data users and data access control scheme in process. We came to know that our certificate less encryption method can efficiently provide not only forward security but also backward security with more efficient way.

read more

Citations
More filters
Journal Article

Survey on access control techniques in cloud computing

TL;DR: A far reaching audit of access control components utilized in the distributed computing condition is presented and the preferences and weaknesses of every one of these models are talked about and introduced alongside their examination.
References
More filters
Journal ArticleDOI

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

TL;DR: A novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers are proposed and a high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE.
Proceedings ArticleDOI

Improving privacy and security in multi-authority attribute-based encryption

TL;DR: This paper proposes a solution which removes the trusted central authority, and protects the users' privacy by preventing the authorities from pooling their information on particular users, thus making ABE more usable in practice.
Journal ArticleDOI

An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing

TL;DR: This paper designs an auditing framework for cloud storage systems and proposes an efficient and privacy-preserving auditing protocol, which is efficient and provably secure in the random oracle model and extends the protocol to support the data dynamic operations.
Journal ArticleDOI

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

TL;DR: This paper designs an expressive, efficient and revocable data access control scheme for multi-authority cloud storage systems, where there are multiple authorities co-exist and each authority is able to issue attributes independently.
Proceedings ArticleDOI

Public auditing for shared data with efficient user revocation in the cloud

TL;DR: A novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind is proposed, which allows the cloud to re-sign blocks on behalf of existing users during user revocation, so that existing users do not need to download and re-signed blocks by themselves.