ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Methodology for Assigning Access Control to Public Clouds?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 12)

Publication Date:

Authors : ; ;

Page : 126-132

Keywords : ;

Source : Downloadexternal Find it from : Google Scholarexternal


With the emergence of cloud computing technology and its ability to provide various services at affordable prices has become an important catalyst for many organizations to outsource their data to public cloud. The data owners might allow other users to gain access to their data. In this context, it is important to provide end to end data security to data. In this paper, our focus was on building an architecture that supports perfect communication between data owners, cloud servers and users. The users gain access to data as per the policies presented by the data owners. The data owners encrypt data and send it to cloud. The data owners also delegate access control policies to public cloud where re-encryption of data is taken place. Thus the users of the data can access data in perfectly secure environment. The experiments reveal that the proposed approach is very useful in securing outsourced data and still give access to various users based on the deleted access control policies to public cloud.

Last modified: 2014-12-10 22:38:21