Cloud Based Secure File Sharing Using Access Control

نویسندگان

چکیده

In the current environment, data security is paramount, and any confidential files we must have with us everywhere go raise chance of losing such files. To prevent this inconvenient method transporting private information, our suggested solution uses cloud to store users' myriad size in encrypted form, encrypting them using AES-256 version technique ensure that your remains secret. The user no longer has be concerned about breaches when sharing his file intended recipient, since he may now provide permission access document only people chooses, it will accessible him. With approach, saving exchange made possible. Our encryption algorithm version, which all grouped into a string bits subsequently converted 128-bit blocks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Policy Based Access Control and Assured File Deletion for Secure Cloud Storage

Security guarantees are essential for the outsourced data, wh ich is maintained by third party cloud storage. To achieve s ecurity gu arantees f or t he out sourced data ba ckups, we design and implement a secure overlay cloud storage system called FADE. FADE achieves fine-grained, policy-based access control and file assured deletion. I t associates outsourced files with file access policies, ...

متن کامل

Cloud Access Security On File System Using Secure Policies For Jelastic Cloud

Now a days we can outsource data backups offsite to third-party cloud storage services(Jelastic cloud) by which we can reduce data management costs. However, we need to provide security guarantees for the outsourced data, maintained by third parties. In this paper we design and implement FADE, a secure overlay cloud storage system which is able to achieve fine-grained, policy-based access contr...

متن کامل

Trust-Based Access Control for Secure Cloud Computing

Multi-tenancy, elasticity and dynamicity pose several novel challenges for access control in a cloud environment. Accessing subjects may dynamically change, resources requiring protection may be created or modified, and subject access requirements to resources may change during the course of the application execution. Users may need to acquire different permissions from different administrative...

متن کامل

A Secure Access Control system in Cloud

Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients' control over access to their own PHRs, i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of scientific research in computer science, engineering and information technology

سال: 2022

ISSN: ['2456-3307']

DOI: https://doi.org/10.32628/cseit228458