Different access control methods with revocationin multi-authority cloud

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effective Data Access Control for Multi-Authority Cloud Storage with Intrusion Detection

Business Record (BR) is an emerging centric model of information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as business information could be exposed to those third party servers and to unauthorized parties. To assure the business data control over access to their own BRs, it is a promising method to ...

متن کامل

TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems

Data access control is an effective way to ensure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-based Encryption (CP-ABE), as a promising technique for access control of encrypted data, is very suitable for access control in cloud storage systems due t...

متن کامل

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

Data access control is an efficient way to make sure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners mor...

متن کامل

Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control

now a days, plenty of users area unit storing their data’s in cloud, as a result of it provides storage flexibility. However the most drawbacks in cloud are information security. Cipher text-Policy Attribute-based cryptography (CP-ABE) is thought to be one among the foremost appropriate technologies for information access management in cloud storage; as a result of it offers information house o...

متن کامل

Multi-authority Cloud Storage by Using Efficient Revocation in Two- Circumstance Data Access Management

Side-channel investigation (SCA) misuses the data spilled through unexpected yields (e.g., control utilization) to uncover the mystery key of cryptographic modules. The genuine danger of SCA lies in the capacity to mount assaults over little parts of the key and to total data over various encryptions. The danger of SCA can be foiled by changing the mystery key at each run. To be sure, numerous ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Engineering & Technology

سال: 2017

ISSN: 2227-524X

DOI: 10.14419/ijet.v7i1.1.9713