International Journal of Advances in Computer Science and Cloud Computing (IJACSCC)
.
Follow Us On :
current issues
Volume-11,Issue-2  ( Nov, 2023 )
Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 20
Paper Published : 176
No. of Authors : 459
  Journal Paper


Paper Title :
Privacy Preserving Access Control Mechanism In Public Clouds

Author : Shubhangi Repale, Priyanka Petkar,Prajakta Patil, Pratiksha Yadav, Vaishali Shinde

Article Citation : Shubhangi Repale ,Priyanka Petkar ,Prajakta Patil ,Pratiksha Yadav ,Vaishali Shinde , (2015 ) " Privacy Preserving Access Control Mechanism In Public Clouds " , International Journal of Advances in Computer Science and Cloud Computing (IJACSCC) , pp. 12-14, Volume-3,Issue-1

Abstract : Fine-grained access control mechanisms on secure data in the cloud are based on encryption of the data in fine-grained approach. In these approaches, owners of the data in cloud encrypt the data before uploading them on the cloud and re-encrypt the data whenever user credentials change. Owners of the data also known as Data owners thus generate high costs in terms of communication and computation. A better approach should be used that delegates the enforcement of fine-grained access control to the cloud, minimizing overhead at the data owners. Also assure data confidentiality from the cloud. Our technique is based on two layers of encryption that targets such requirement. In the proposed approach, the data owner performs a coarse-grained encryption, while the cloud performs a fine-grained encryption on the owner encrypted data. A challenge is to decompose access control policies (ACPs) such that the two layer encryption can be made. We also utilize an efficient group key management scheme that supports communicative ACPs. Our system assures the confidentiality of the data and preserves the privacy of user’s data from the cloud while delegating most of the access control enforcement to the cloud. Keywords- Access Control, Encryption, Identity, Policy Decomposition.

Type : Research paper

Published : Volume-3,Issue-1


DOIONLINE NO - IJACSCC-IRAJ-DOIONLINE-2062   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 116
| Published on 2015-05-07
   
   
IRAJ Other Journals
IJACSCC updates
IJACSCC Volume-11,Issue-2(Nov, 2023)
The Conference World

JOURNAL SUPPORTED BY


Warning: include(footer.php): failed to open stream: No such file or directory in /home/dakhinaray/public_html/ITRESEARCH_WEBSTE/IRAJ.IN/journal/IJACSCC/paper_detail.php on line 842

Warning: include(): Failed opening 'footer.php' for inclusion (include_path='.:/opt/alt/php56/usr/share/pear:/opt/alt/php56/usr/share/php') in /home/dakhinaray/public_html/ITRESEARCH_WEBSTE/IRAJ.IN/journal/IJACSCC/paper_detail.php on line 842