1,110 Hits in 7.6 sec

Survey on Regenerating Code Based Revocable and Searchable ABE Scheme for Mobile Cloud Storage

Jayesh Sahebrav Patil, Prashant Mininath Mane
2018 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
So, a secure user imposed data access control system must be given, before the users outsource any data to the cloud for storage.  ...  From the time in memorial, Information Security has remained a primary concern and today when most of the sensitive data is stored on Cloud with client organization having lesser control over the stored  ...  It provides security for appropriate users by using the user based access control attributes.  ... 
doi:10.32628/cseit183895 fatcat:kruj2prwxjhwdm2qbijposfxha

Access Control and Revocation for Digital Assets on Cloud with Consideration for Sharing

Prof.Sabera Begum, Mohd. Ghouse
2017 International Journal of Engineering Research and Applications  
In this paper we propose a solution of integrated access control for contents shared on cloud and its efficient revocation. .  ...  In cloud computing applications, users' data and applications are hosted by cloud providers. With internet and cloud availability increasing numbers of people are storing their content on cloud.  ...  In finegrained attribute-based access control, a set of access control rules specifies the conditions under which access to a digital asset is granted.  ... 
doi:10.9790/9622-0705030609 fatcat:iovey6qngjh2zfrtzjgmr4e7iu

A Survey on Decentralized Access Control Strategies for Data Stored in Clouds

J.Ganesh kumar, N.Raj esh, J.Elava rasan, Prof.M. Sarmila, Prof.S.Bala murugan
2015 International Journal of Innovative Research in Computer and Communication Engineering  
It is a Decentralized access of system in which every system have the access control of data .  ...  User can revocate the data only by addressing through the cloud.  ...  ATTRIBUTE BASED DATA SHARING WITH ATTRIBUTE REVOCATION S. Yu, C. Wang, K. Ren, and W.  ... 
doi:10.15680/ijircce.2015.0301047 fatcat:t6hy6b6bpze3tm4peem2ptigwm

Secure Sharing of Data for Dynamic Group in Cloud Storage Application

Dr. Dhanaraj Cheelu, K. V. Uma Maheswari
2021 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
To Key Generation method for user a time based dynamic group Key which capably to make stronger in cloud security.  ...  This problem to avoid that sharing data in group using the Time Based Group Key Management (TGKM) techniques for cryptographic cloud storage application , which Conditional Identity Based Broadcast Proxy  ...  Yu et al. [1] a scalable and fine-grained data access control method access polices based on data attributes element using and KP-ABE technique.  ... 
doi:10.32628/cseit217299 fatcat:yf5zdd4ulnh3fevj5qsa7pcqzy

A Review and Survey of Various Attribute based Data Storage & Deduplication in Cloud

2018 Journal of Computer & Information Technology  
Here in this paper survey of all the existing techniques that are implemented based on Attribute based Encryption Data Storage and Deduplication over Cloud Computing, hence on the basis of various limitations  ...  On the additional hand, be appropriating data deduplication acquires protection vulnerabilities in the cloud storage method so that unauthorized attributes including a cloud server or unknown users may  ...  Alfin Abraham et al. 9 proposed survey of Identity-based encryption with efficient revocation.  ... 
doi:10.22147/jucit/090202 fatcat:e36sughpabhr5mjcuy6hvyk4pu

Data Security and Privacy Protection for Cloud Storage: A Survey

Pan Yang, Neal N. Xiong, Jingli Ren
2020 IEEE Access  
Although there are some studies on data security and privacy protection, there is still a lack of systematic surveys on the subject in cloud storage system.  ...  Secondly, we give a detailed analysis on challenges and requirements of data security and privacy protection in cloud storage system.  ...  Lattice based revocable storage still needs further exploration. V. CONCLUSION In this paper, we give a detail survey on data security and privacy preservation in cloud storage system.  ... 
doi:10.1109/access.2020.3009876 fatcat:6kcb3junlzhvvcq3qhztumpdqq

Privacy Provision in Collaborative eHealth with Attribute-Based Encryption: A Survey, Challenges and Future Directions

Kennedy Edemacu, Hung Kook Park, Beakcheol Jang, Jong Wook Kim
2019 IEEE Access  
Also, we perform a comparative analysis of the surveyed schemes in terms of security, revocation ability, and efficiency.  ...  The attribute-based encryption, which has shown potential in data privacy protection in the cloud, has the necessary ingredients to be used in guarding against privacy violations in collaborative eHealth  ...  As a drawback, the identity-based access control is a one-to-one scheme unsuitable for fine-grained access control and data sharing in cloud-based systems.  ... 
doi:10.1109/access.2019.2925390 fatcat:bjjmpqmqpjc4die6bmezjrt4ki

Attribute-based data access control in mobile cloud computing: Taxonomy and open issues

Mehdi Sookhak, F. Richard Yu, Muhammad Khurram Khan, Yang Xiang, Rajkumar Buyya
2017 Future generations computer systems  
However, because of delegating the management of data to an untrusted cloud server in data outsourcing process, the data access control has been recognized as a challenging issue in cloud storage systems  ...  One of the preeminent technologies to control data access in cloud computing is Attribute-based Encryption (ABE) as a cryptographic primitive, which establishes the decryption ability on the basis of a  ...  Acknowledgment This work was supported in part by the Natural Sciences and Engineering Research Council of Canada.  ... 
doi:10.1016/j.future.2016.08.018 fatcat:3gc23jcp6rdhnok5xsm2swcpu4

Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption

Al-Dahhan, Shi, Lee, Kifayat
2019 Sensors  
the revocation, and comparisons among themaccording to a number of secure cloud storage criteria.  ...  In particular, Ciphertext‐Policy AttributeBased Encryption (CP‐ABE) is a promising,advanced type of encryption technique that resolves an open challenge to regulate fine‐grainedaccess control of sensitive  ...  Acknowledgments: The authors gratefully acknowledge support from the Republic of Iraq, the Iraqi Higher Education Ministry, Iraqi Cultural Attaché in London, and University of Anbar in Iraq.  ... 
doi:10.3390/s19071695 fatcat:ebu4reenvbcsflttzyr26o2jw4

A Review of Role based Encryption System for Secure Cloud Storage

Avdhut SuryakantBhise, Phursule R.N
2015 International Journal of Computer Applications  
It has raised the important security issue of controlling and preventing any unauthorized access of data stored in the cloud.  ...  A hybrid cloud storage of the RBE scheme architecture permits an organization to store data secure in a public cloud and maintains the private information related to the organizational structure in a private  ...  Cloud data storage can be attractive for users with uncertain storage demands, requiring a cheap storage tier or a low cost, long-term archive.  ... 
doi:10.5120/19255-0986 fatcat:nqoopgeuorfatpaof3v4lk6jfa

Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals' Security Practices

Livinus Obiora Nweke, Prosper Yeng, Stephen D., Bian Yang
2020 International Journal of Advanced Computer Science and Applications  
In recent years, there has been an increase in the application of attribute-based access control (ABAC) in electronic health (e-health) systems.  ...  In this paper, we conduct a survey of the existing literature on the application of ABAC in e-health systems to understand the suitability of ABAC for e-health systems and the possibility of using ABAC  ...  For the paper in [14] , each user has a user-index which facilitates direct revocation of user access to an encrypted data.  ... 
doi:10.14569/ijacsa.2020.0110286 fatcat:jyhz4qys4vazzesvyz6hb7bmeq

A Survey on Multi Owner Data Sharing for Dynamic Groups in the Cloud Securely

Sushma Nallamalli
2016 International Journal Of Engineering And Computer Science  
, the storage overhead, length of the signature and the running time of the signing algorithm are independent with the number of group members.  ...  The fundamental service provided by the Cloud is Data Storage which makes it a primary source for customers to utilize cloud for online data store and share.  ...  In cryptosystem, cipher texts are labelled with sets of attributes and private keys are associated with access structures that control which cipher texts a user is able to decrypt.  ... 
doi:10.18535/ijecs/v5i11.02 fatcat:o5357yml25bydk3moyy33zfnoa

A Survey on Access Control in Semi-Trusted Cloud Environment

E. Karthik
2019 International Journal for Research in Applied Science and Engineering Technology  
In P2P based systems, CP-ABE algorithm along with a proxy re-encryption scheme has been for access control in cloud storage.  ...  One of which is lack of secure data access control. Various techniques have been proposed to achieve secure data access control in semi-trusted cloud environment.  ...  In this paper [3] , the author proposed that the data access control in public cloud storage systems was traditionally secured by a scheme called Cipher text-Policy Attribute-Based Encryption (CP-ABE)  ... 
doi:10.22214/ijraset.2019.3049 fatcat:u24nqtjql5dpzhufwto2sh2r5a

Ensuring Security and Privacy Preservation for Cloud Data Services

Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya
2016 ACM Computing Surveys  
We first present security threats and requirements of an outsourcing data service to a cloud, and follow that with a high-level overview of the corresponding security technologies.  ...  We then dwell on existing protection solutions to achieve secure, dependable, and privacy-assured cloud data services including data search, data computation, data sharing, data storage, and data access  ...  User/Attribute Revocation. Generally, there are two levels of revocation in an ABEbased access control system: user revocation and attribute revocation.  ... 
doi:10.1145/2906153 fatcat:c57iz6lswvfxbmhireksha35vm

A Survey on Privacy Preserving in Authentication Protocol for Shared Authority Based Cloud Computing

Thoke Virendra Dilip
2017 International Journal for Research in Applied Science and Engineering Technology  
in information sharing among the multiple users in cloud storage. so as to avoid of these things, a system is projected during which a shared authority primarily based privacy-preserving authentication  ...  Cloud computing is rising as a prevailing information interactive paradigm to appreciate users information remotely keep in an internet cloud server.  ...  The data access privilege will be depending upon misbehavior of user in cloud server. Attribute Based Encryption (ABE) is predominantly used to secure the cloud storage.  ... 
doi:10.22214/ijraset.2017.3096 fatcat:jb2ujj3h2fbupfgbmejo764vgq
« Previous Showing results 1 — 15 out of 1,110 results