alexa Data Access Control in Cloud Using Attribute Based Rev
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article

Data Access Control in Cloud Using Attribute Based Revocation Algorithm

Karthikeyan.C1, Vignesh.R2
  1. M.E, Department of CSE, Arunai Engineering College, Tiruvannamalai, Tamilnadu, India1
  2. M.E, Department of CSE, Arunai Engineering College, Tiruvannamalai, Tamilnadu, India2
Related article at Pubmed, Scholar Google
 

Abstract

Cloud computing as an emerging technology allows the user to store the data and information in the third party cloud such that users can use the services of the cloud on-demand. For small and medium level industries, budget is a major constraint. Thus while data is present in third party data centers, data confidentiality and integrity is a major concern. Many researches tried to achieve security in the cloud by using various algorithms. Traditionally to secure our data stored in the third party data center, encryption and decryption mechanisms are used. Here we mainly concentrate on business cloud where various organizations store their data about their business plans in the cloud. In this paper, we use an attribute based revocation algorithm in which it provides a secure access to data in the cloud. The user of an organization can be able to access the particular set of information present in the cloud. This technique also uses revocation list which contains the set of users associated with specific projects such that those privileged users can only be able to access the information. Moreover, the overhead caused due to storage and encryption techniques are eradicated and independent to the number of users. We have analyzed the security of our algorithm and also the efficiency.

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords