Optimizing the Cloud Multimedia Resources using Attribute Based Access through Virtualization
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 1)Publication Date: 2015-01-05
Authors : Patil Siddharam; Rekha Patil;
Page : 775-782
Keywords : Cloud Computing; Cryptographic Techniques; Third Party Auditor; Attribute Based Access;
Abstract
Cloud Computing has been envisioned as the emerging technology in which resources are provided as services over the Internet. When there is large number of users, it is difficult to check the data integrity, confidentially between user and Cloud Service Provider (CSP). In such scenarios, Third Party Auditor (TPA) is employed who not only manages the data but also intimates the user if data modified. When users outsource data to un-trusted servers, existing systems usually apply cryptographic techniques by allowing only authorized user to access the contents. This inevitably introduces computation overhead on data owner. In order to overcome this, proposed scheme defines a way to access the data based on access policy which is defined by data owner.
Other Latest Articles
- The Prevalence of delta508 in Cystic Fibrosis Patients with Low Bone Mineral Density in Republic of Macedonia
- ICT and its Impact on Library and Information Services: A Case study of Kendriya Vidyalaya Libraries
- NMWD Model for Effect of Isotonic Saline, Hypertonic Saline on Plasma Renin
- A Survey of Content Aware Video based Social Recommendation System
- Secure Spread Spectrum Data Embedding and Extraction
Last modified: 2021-06-30 21:20:16