Survey on Re-encryption based Attribute Revocation in Data Access Control for Multi-Authority Cloud Storage
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 3)Publication Date: 2016-03-05
Authors : Kalyani G. Kotangale; Milind Penurkar;
Page : 1208-1210
Keywords : Data access control; Attribute Revocation; Re-encryption;
Abstract
In Services including private users, businesses and governments, Cloud Computing technologies are gaining importance at a very higher level. Cloud computing provides transparency, but sharing of resources at a distributed level has severe implications when sensitive or privacy-relevant data is concerned. To ensure the data security in cloud Data access control is an effective way. But due to the untrusted cloud servers, data access contoll becomes a challenging issue in cloud storage systems. However after attribute revocation if we have to provide security through re-encryption, then this is not given. In this paper we proposed re-encryption-based attribute revocation schemes by relying on a trusted server and we apply it as underlying techniques to design the data access control scheme. Our re-encryption method can efficiently provide both forward security and backward security.
Other Latest Articles
- Approaches for Testing Uniformity Hypothesis in Angular Data of Mega-Herbivores
- Detection of Scene Change in Video
- ARM Based Customizing an Operating System for the Single Board System (Cubie-Truck)
- Bifurcation of a Prey-predator System with Holling Type-III Functional Response Function
- Effect of Exogenous Enzyme Supplementation of Dried Pulverized Unripe Plantain Peel Meal on the Performance and Carcass Characteristics of Finisher Broilers
Last modified: 2021-07-01 14:32:41