Study on Competent and Revocable Data Access Control Scheme for Multi-Authority Cloud Storage Systems
A.Shekinah prema sunaina, , , ,
Cloud computing multi-tenancy feature, which provides privacy, security and access control challenges, because of sharing of
physical resources among untrusted tenants. In order to achieve safe storage, policy based file access control, policy based file assured deletion
and policy based renewal of a file stored in a cloud environment, a suitable encryption technique with key management should be applied before
outsourcing the data. Cipher text-Policy Attribute-based Encryption (CP-ABE) is considered as one of the most suitable scheme for data access
control in cloud storage. This scheme provides data owners more direct control on access policies. However, CP-ABE schemes to data access
control for cloud storage systems are difficult because of the attribute revocation problem. So this paper produce investigation on competent and
revocable data access control scheme for multi-authority cloud storage systems, where there are multiple authorities cooperate and each
authority is able to issue attributes independently. Specifically, this paper surveys a revocable multi-authority CP-ABE scheme. The attribute
revocation method can efficiently achieve both forward security and backward security.
A.Shekinah prema sunaina."Study on Competent and Revocable Data Access Control Scheme for Multi-Authority Cloud Storage Systems". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 05,pp.365-368, May- 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I517.pdf,
. S.Yu, C.Wang, K.Ren, and W.Lou, „„Attribute Based Data Sharing with Attribute Revocation,‟‟ in Proc. 5th ACM Symp. Information, Computer and Comm. Security (ASIACCS‟10), 2010, pp. 261-270.
. J. Hur and D.K. Noh, „„Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,‟‟ IEEE Trans. Parallel Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011.
.S.Jahid, P.Mittal, and N.Borisov, „„Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation,‟‟ in Proc. 6th ACM Symp. Information, Computer and Comm. Security (ASIACCS‟11), 2011, pp. 411-415.
.M. Li, S. Yu, Y. Zheng, K. Ren, andW.Lou, „„Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,‟‟ IEEE Trans. Parallel Distributed Systems, vol. no. 1, pp. 131-143, Jan. 2013. 24,
.Kan Yang, and Xiaohua Jia, „„Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage,‟‟ IEEE transactions on parallel and distributed systems, vol. 25, no. 7, july 2014.
 MrSanthoshkumarB.J, M.Tech, Amrita VishwaVidyapeetham, Mysore Campus, India “Attribute Based Encryption with Verifiable Outsourced Decryption.” In International Journal of Advanced Research in Computer Science and Software Engineering”Volume 4, Issue 6, June 2014,ISSN: 2277 128X.
Tejaswini R M1, Roopa C K2 , Ayesha Taranum “Securing Cloud Server & Data Access withMulti-Authorities” International Journal of Computer Science and Information Technology Research ISSN 2348- 120X Vol. 2, Issue 2, pp: (297-302), Month: April-June 2014,
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.