Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 101

Research Paper | Information Technology | India | Volume 5 Issue 9, September 2016

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

In Services including private users, businesses and governments, Cloud computing technologies are gaining importance at a very higher level. Cloud computing provides transparency, but sharing of resources at a distributed level has severe implications when sensitive or privacy-relevant data is concerned. To ensure the data security in cloud Data access control is an effective way. But due to the untrusted cloud servers, data access control becomes a challenging issue in cloud storage systems. However after attribute revocation if we have to provide security through re-encryption, then this is not given. In this paper we proposed certificate less encryption-based schemes by relying on a public cloud server and we apply it as underlying techniques to design the data access control scheme. Our certificate less encryption method can efficiently provide both forward security and backward security.

Keywords: Data access control, Attribute Revocation, Re-encryption

Edition: Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Share this Article

How to Cite this Article?

Kalyani G. Ktangale, Milind Penurkar, "Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20162042, Volume 5 Issue 9, September 2016, 1751 - 1754

Enter Your Email Address




Similar Articles with Keyword 'Data access control'

Downloads: 105

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Downloads: 109

Survey Paper, Information Technology, India, Volume 5 Issue 3, March 2016

Pages: 1208 - 1210

Survey on Re-encryption based Attribute Revocation in Data Access Control for Multi-Authority Cloud Storage

Kalyani G. Kotangale, Milind Penurkar

Share this Article

Similar Articles with Keyword 'Data'

Downloads: 315 | Monthly Hits: ⮙2

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Downloads: 1

Case Studies, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 563 - 567

Online Teaching Excellence: A Case Study of EMC Institute Kishtwar during COVID-19 Lockdown

Dr. Ashaq Hussain

Share this Article

Similar Articles with Keyword 'access'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 81

Research Paper, Information Technology, Kenya, Volume 9 Issue 10, October 2020

Pages: 502 - 505

Integrated Library Systems and Performance of the Post-Modern Library of Kenyatta University, Kenya

Yvonne Oyaro Opiyo, David Nzuki

Share this Article

Similar Articles with Keyword 'control'

Downloads: 81

Research Paper, Information Technology, Kenya, Volume 9 Issue 10, October 2020

Pages: 502 - 505

Integrated Library Systems and Performance of the Post-Modern Library of Kenyatta University, Kenya

Yvonne Oyaro Opiyo, David Nzuki

Share this Article

Downloads: 86

Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1896 - 1909

Users Experience with E-Journal Features: A Research Survey of Aerospace Scientists and Engineers of Bangalore

R. Guruprasad, P. Marimuthu

Share this Article

Similar Articles with Keyword 'Attribute'

Downloads: 105

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2441 - 2444

Privacy-Preservation of Centralized and Distributed Social Network by Using L-Diversity Algorithm

Shankaranand, P. Rajasekar

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1743 - 1746

Hybrid Approach for Outlier Detection in High Dimensional Dataset

Rohini Balkrishna Gurav, Sonali Rangdale

Share this Article

Similar Articles with Keyword 'Revocation'

Downloads: 109

Survey Paper, Information Technology, India, Volume 5 Issue 3, March 2016

Pages: 1208 - 1210

Survey on Re-encryption based Attribute Revocation in Data Access Control for Multi-Authority Cloud Storage

Kalyani G. Kotangale, Milind Penurkar

Share this Article

Downloads: 117

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 724 - 726

A Survey on Anonymous User Authentication using Decentralized Key Distribution Architecture

Purva Chavan, Prof. B. P. Vasgi

Share this Article



Top