ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey on Cloud Based Secure Self Destruction Accessibility with Time and Location

Journal: International Journal of Scientific Engineering and Research (IJSER) (Vol.4, No. 10)

Publication Date:

Authors : ; ; ; ; ;

Page : 63-65

Keywords : cloud computing; privacy preserving; sensitive data; secure file grained access; secure self destruction;

Source : Downloadexternal Find it from : Google Scholarexternal


Now a day, use of cloud is becoming easier to accessing data throughout the internet as well as easy to share file. During this lifecycle privacy security and also access control becomes challenging task especially when wants to share someone important data with anyother. This problem, can be solved using ?key policy attribute based encryption with time based attribute (KP-TSABE)? and ?location based attribute?, a new secure data self destruction scheme on cloud computing. In this method every cipher text is labeled with specific time interval and also location of user who will access, in which private key is associated with time interval. This cipher-text can only be decrypted if and only if the time interval and location is matched. It also provides the security by using the authorization period and secure fine grained access control during that period. The files will be self-destructed if time interval expires. This proposed system can provide data security from the third party user.

Last modified: 2021-07-08 15:43:18