ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Key-Aggregate Based Vulnerable Data Access Control in Cloud Computing

Journal: International Journal of Trend in Scientific Research and Development (Vol.2, No. 3)

Publication Date:

Authors : ;

Page : 1962-1965

Keywords : Computer Engineering;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In the developing technologies in the computers the cloud computing is one the way to provide services through the internet to the users in the efficient manner. Cloud based services not only provide users with convenience, but also bring many security issues. The user can store his data in the cloud service. Although cloud computing brings great convenience to enterprises and users, the cloud computing security has always been a major hazard. For users, it is necessary to take full advantage of cloud storage service, and also to ensure data privacy. The system proposed a fine-grained two-factor authentication (2FA) access control system, 2FA access control system, an attribute-based access control mechanism is implemented with the necessity of both user secret key and a BBS+ Signatures. The mechanism implemented using CP-IBE(cipher text identity based encryption) and digit signature authority, compare to existing method which provide the paranoid security and achieving the secure data access in cloud computing. Sowmiya. S | Dr. T. Priyaradhikadevi"Key-Aggregate Based Vulnerable Data Access Control in Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11633.pdf http://www.ijtsrd.com/engineering/computer-engineering/11633/key-aggregate-based-vulnerable-data-access-control-in-cloud-computing/sowmiya-s

Last modified: 2018-08-04 13:46:44