ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)

Publication Date:

Authors : ; ;

Page : 1588-1591

Keywords : Cloud Computing; Attribute-based Encryption; public keys; private keys; cipher text;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing is a revolutionary computing environment, which allows user a flexible, on-demand, and low-cost usage of computing resources, but as the data is outsourced to some cloud servers, and various privacy issues emerge from it. To handle these security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Attribute-based Encryption (ABE) is a cryptographic conducting tool to guarantee data owners direct control over their data in public cloud storage. ABE is an encryption method used by the user to store the data in the cloud. ABE is a public-key based one to many encryption methodologies which allows users to encrypt and decrypt data based on user attributes. In this paper we studied various schemes of ABE like KP-ABE, CP-ABE, AnonyControl and AnonyControl-F, also we analyzed how data access privilege and data sharing can be controlled by using various schemes of ABE.

Last modified: 2021-07-01 14:26:37