Different access control methods with revocationin multi-authority cloud

K. V. V. Satyanarayana, J. Mahathi, V. V. R. Srikar, S.K. Sai Babu
2017 International Journal of Engineering & Technology  
Now-a-days, usage of cloud is getting more popular and for the safety the security is being enhanced every day from time to time. Multiple security techniques are being implemented.Attribute based security is one of the concepts especially for basics of the cipher-text based, but the user's attributes were given by the multiple authorities. So, the multi-authority with cipher-text encryption is emerging at present. In this, we will see why the cipher-text based is important and different
more » ... y models with the multi-authority with the revocation in the different levels in the security models.
doi:10.14419/ijet.v7i1.1.9713 fatcat:ays5cjq5f5ey7out7p5tkmp47m