Different access control methods with revocationin multi-authority cloud
نویسندگان
چکیده
منابع مشابه
Effective Data Access Control for Multi-Authority Cloud Storage with Intrusion Detection
Business Record (BR) is an emerging centric model of information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as business information could be exposed to those third party servers and to unauthorized parties. To assure the business data control over access to their own BRs, it is a promising method to ...
متن کاملTAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems
Data access control is an effective way to ensure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-based Encryption (CP-ABE), as a promising technique for access control of encrypted data, is very suitable for access control in cloud storage systems due t...
متن کاملExpressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
Data access control is an efficient way to make sure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage, because it gives data owners mor...
متن کاملSecure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control
now a days, plenty of users area unit storing their data’s in cloud, as a result of it provides storage flexibility. However the most drawbacks in cloud are information security. Cipher text-Policy Attribute-based cryptography (CP-ABE) is thought to be one among the foremost appropriate technologies for information access management in cloud storage; as a result of it offers information house o...
متن کاملMulti-authority Cloud Storage by Using Efficient Revocation in Two- Circumstance Data Access Management
Side-channel investigation (SCA) misuses the data spilled through unexpected yields (e.g., control utilization) to uncover the mystery key of cryptographic modules. The genuine danger of SCA lies in the capacity to mount assaults over little parts of the key and to total data over various encryptions. The danger of SCA can be foiled by changing the mystery key at each run. To be sure, numerous ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering & Technology
سال: 2017
ISSN: 2227-524X
DOI: 10.14419/ijet.v7i1.1.9713