Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 129 , Downloads: 101 | CTR: 78 % | Weekly Popularity: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Cloud computing is a revolutionary computing environment, which allows user a flexible, on-demand, and low-cost usage of computing resources, but as the data is outsourced to some cloud servers, and various privacy issues emerge from it. To handle these security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Attribute-based Encryption (ABE) is a cryptographic conducting tool to guarantee data owners direct control over their data in public cloud storage. ABE is an encryption method used by the user to store the data in the cloud. ABE is a public-key based one to many encryption methodologies which allows users to encrypt and decrypt data based on user attributes. In this paper we studied various schemes of ABE like KP-ABE, CP-ABE, AnonyControl and AnonyControl-F, also we analyzed how data access privilege and data sharing can be controlled by using various schemes of ABE.

Keywords: Cloud Computing, Attribute-based Encryption, public keys, private keys, cipher text

Edition: Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Share this Article

How to Cite this Article?

Nishitara Shelke, Vidya Dhamdhere, "Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151519, Volume 4 Issue 11, November 2015, 1588 - 1591

129 PDF Views | 101 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud Computing'

Views: 201 , Downloads: 173 | CTR: 86 %

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Views: 122 , Downloads: 96 | CTR: 79 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Similar Articles with Keyword 'Attribute-based Encryption'

Views: 129 , Downloads: 101 | CTR: 78 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Views: 131 , Downloads: 102 | CTR: 78 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 1553 - 1555

A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentication

Manju Lakshmi, Anju Rachel Oommen, Smita C Thomas

Share this Article

Views: 136 , Downloads: 103 | CTR: 76 % | Weekly Popularity: ⮙1

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1788 - 1790

Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data

Amruta N. Deshmukh, Komal B. Bijwe

Share this Article

Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1687 - 1689

Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar

Share this Article

Views: 136 , Downloads: 107 | CTR: 79 % | Weekly Popularity: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 639 - 642

A Review On Cloud Storage Architectures

Pallavi D. Dudhe, P. L. Ramteke

Share this Article

Similar Articles with Keyword 'public keys'

Views: 129 , Downloads: 101 | CTR: 78 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Views: 126 , Downloads: 105 | CTR: 83 % | Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 781 - 785

Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks

P. Harikrishna, K. V. Srinivasa Rao

Share this Article

Views: 126 , Downloads: 107 | CTR: 85 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1584 - 1587

Multicasting with Key Management

Chaithra K, Asha N

Share this Article

Similar Articles with Keyword 'private keys'

Views: 129 , Downloads: 101 | CTR: 78 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1687 - 1689

Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar

Share this Article

Views: 144 , Downloads: 105 | CTR: 73 % | Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2165 - 2166

Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data

Princy.B, Nishley Elizabeth Joseph

Share this Article

Views: 160 , Downloads: 123 | CTR: 77 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1678 - 1682

A Survey on an Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds

Namrata Charati, M. D. Ingle

Share this Article

Views: 206 , Downloads: 128 | CTR: 62 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 273 - 276

Performance Evaluation of Secured Reactive Routing Protocols in MANETs

Shwetha T R, Dr Arun Biradar

Share this Article

Similar Articles with Keyword 'cipher text'

Views: 129 , Downloads: 101 | CTR: 78 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Views: 122 , Downloads: 102 | CTR: 84 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1736 - 1740

Enhanced Retreat of Cloud Storage Data users by Using Improved Data Access Control Scheme for Multi-Authority Cloud Storage

Shafi Shaik, M. Geethalatha

Share this Article

Views: 152 , Downloads: 103 | CTR: 68 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Views: 127 , Downloads: 104 | CTR: 82 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Views: 124 , Downloads: 105 | CTR: 85 % | Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1087 - 1091

Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud

Kavitha K, Manjula R

Share this Article
Top