Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)Publication Date: 2015-11-05
Authors : Nishitara Shelke; Vidya Dhamdhere;
Page : 1588-1591
Keywords : Cloud Computing; Attribute-based Encryption; public keys; private keys; cipher text;
- Effects of Regular Coke and Coke Zero on Blood Glucose, Serum Lipid Profile and Activities of Serum Aminotransferases in Healthy Human Subjects
- EFFECT OF DILATION OF COAL BLEND ON PUSH FORCE AND COKE QUALITY IN STAMP CHARGED COKE MAKING PROCESS
- Coke Quality Prediction Model Based on Coking Coal Group Composition and Structural Parameters and Its Coke Forming Mechanism
- Acute Effect of Moringa Oleifera Raw Seeds on Blood Glucose, Serum Lipid and Liver Enzyme Profiles in Alloxan–Induced Diabetic Albino Wister Rats
- Effect of Garcinia Kola Seed on Serum Enzyme, Urea, Creatinine and Electrolytes of Healthy Human Subjects
Abstract
Cloud computing is a revolutionary computing environment, which allows user a flexible, on-demand, and low-cost usage of computing resources, but as the data is outsourced to some cloud servers, and various privacy issues emerge from it. To handle these security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Attribute-based Encryption (ABE) is a cryptographic conducting tool to guarantee data owners direct control over their data in public cloud storage. ABE is an encryption method used by the user to store the data in the cloud. ABE is a public-key based one to many encryption methodologies which allows users to encrypt and decrypt data based on user attributes. In this paper we studied various schemes of ABE like KP-ABE, CP-ABE, AnonyControl and AnonyControl-F, also we analyzed how data access privilege and data sharing can be controlled by using various schemes of ABE.
Other Latest Articles
- Multiple Objectives and Outsourcing Contracts in IT Outsourcing
- Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
- Design and Analysis of Stimulated Brillouin Scattering in Fiber Optic System for Distributed Sensing Using Optisystem
- Encrypting Digital Images and Using Diverse Image Media for Sharing Digital Images
- Value Education in Literature Traditional Bali as the Establishment of Reference Characters
Last modified: 2021-07-01 14:26:37