Role Based Encryption with Efficient Access Control in Cloud Storage
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 5 Issue 2, February 2016

Role Based Encryption with Efficient Access Control in Cloud Storage

G. V. Bandewar, R. H. Borhade

Cloud is nothing but the platform where large amount of data can be stored virtually. As the concept says that cloud provide many types of services to the users. Extra resources can be extended virtually so that there is no need to fix any extra resource physically. For example, there is no need to bring the extra RAM for dedicated server. In this concept if hybrid cloud is used. So that, better authentication can be provided. Owner can outsource data to the cloud by attaching policies to that data. Role manager is responsible for adding and revoking roles of a particular user. Admin works as a central authority to the private cloud. Like this admin is responsible for verifying the integrity of data which is stored in the cloud. This system provides better access control because of the hybrid cloud concept.

Keywords: Data storage, Role-based encryption, Cloud computing, Architecture

Edition: Volume 5 Issue 2, February 2016

Pages: 1470 - 1474

Share this Article

How to Cite this Article?

G. V. Bandewar, R. H. Borhade, "Role Based Encryption with Efficient Access Control in Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV161454, Volume 5 Issue 2, February 2016, 1470 - 1474

97 PDF Views | 86 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data storage'

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 1773 - 1777

Optimized Load Balancing in Cloud Computing using Hybrid Approach of Round Robin and Min-Min Scheduling

Muskan Garg, Rajneesh Narula

Share this Article

Research Paper, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 2588 - 2589

Big Data Storage, Collection, & Protection with Islamic Perspective

Ibrahim Nasreldin Ibrahim Ahmed, Mohamad Fauzan Noordin

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 992 - 994

Enhancing Cloud Data Security and Integrity Using Third Party Auditing Service

Rakesh J. Wagh, Rajesh C. Dharmik

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2959 - 2961

Enhancing Media Access Using Cloud Computing for Mobile Devices

Gaurav V. Dahake, Dr. A A.Gurjar

Share this Article

Research Paper, Information Technology, Saudi Arabia, Volume 4 Issue 5, May 2015

Pages: 2115 - 2120

A Novel and Integrated Assessment of Security Challenges in Cloud Computing

Mohd Muntjir, Mohd Rahul

Share this Article

Similar Articles with Keyword 'Cloud computing'

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015

Pages: 1736 - 1745

Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs

Haider N. Hussain

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 1773 - 1777

Optimized Load Balancing in Cloud Computing using Hybrid Approach of Round Robin and Min-Min Scheduling

Muskan Garg, Rajneesh Narula

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Similar Articles with Keyword 'Architecture'

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Research Paper, Information Technology, Iraq, Volume 5 Issue 9, September 2016

Pages: 1134 - 1137

A View to Criterion for Organizes and Manages Unstructured Data

Yasir Ali Mmutni Alanbaky

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 5, May 2014

Pages: 628 - 631

Implementation of Energy Saving Mechanism for multi core Architecture in Cloud Computing

Kinnari Solanki, Tushar A. Champaneria

Share this Article

Informative Article, Information Technology, Malaysia, Volume 4 Issue 1, January 2015

Pages: 2045 - 2049

The Suitability of Native Application for University E-Learning Compared to Web-Based Application

Maya Novia Sari, Noor Azian Bt. Mohamad Ali

Share this Article

Research Paper, Information Technology, Kenya, Volume 6 Issue 4, April 2017

Pages: 1093 - 1099

A Stage Model for Cloud Computing Adoption in E-Government Implementation

Watson M. Kanuku, Judith Boit

Share this Article
Top