Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 5 Issue 9, September 2016

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

In Services including private users, businesses and governments, Cloud computing technologies are gaining importance at a very higher level. Cloud computing provides transparency, but sharing of resources at a distributed level has severe implications when sensitive or privacy-relevant data is concerned. To ensure the data security in cloud Data access control is an effective way. But due to the untrusted cloud servers, data access control becomes a challenging issue in cloud storage systems. However after attribute revocation if we have to provide security through re-encryption, then this is not given.In this paper we proposed certificate less encryption-based schemes by relying on a public cloud server and we apply it as underlying techniques to design the data access control scheme. Our certificate less encryption method can efficiently provide both forward security and backward security.

Keywords: Data access control, Attribute Revocation, Re-encryption

Edition: Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Share this Article

How to Cite this Article?

Kalyani G. Ktangale, Milind Penurkar, "Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20162042, Volume 5 Issue 9, September 2016, 1751 - 1754

103 PDF Views | 77 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data access control'

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 3, March 2016

Pages: 1208 - 1210

Survey on Re-encryption based Attribute Revocation in Data Access Control for Multi-Authority Cloud Storage

Kalyani G. Kotangale, Milind Penurkar

Share this Article

Similar Articles with Keyword 'Attribute Revocation'

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 3, March 2016

Pages: 1208 - 1210

Survey on Re-encryption based Attribute Revocation in Data Access Control for Multi-Authority Cloud Storage

Kalyani G. Kotangale, Milind Penurkar

Share this Article

Similar Articles with Keyword 'Re-encryption'

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 3, March 2016

Pages: 1208 - 1210

Survey on Re-encryption based Attribute Revocation in Data Access Control for Multi-Authority Cloud Storage

Kalyani G. Kotangale, Milind Penurkar

Share this Article

Survey Paper, Information Technology, India, Volume 2 Issue 1, January 2013

Pages: 212 - 216

Survey on Security Challenge for Data forwarding in Cloud

Tushar A. Rane, Shrishail T. Patil, Anita H. Khade

Share this Article
Top