Survey on Re-encryption based Attribute Revocation in Data Access Control for Multi-Authority Cloud Storage
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Information Technology | India | Volume 5 Issue 3, March 2016

Survey on Re-encryption based Attribute Revocation in Data Access Control for Multi-Authority Cloud Storage

Kalyani G. Kotangale, Milind Penurkar

In Services including private users, businesses and governments, Cloud Computing technologies are gaining importance at a very higher level. Cloud computing provides transparency, but sharing of resources at a distributed level has severe implications when sensitive or privacy-relevant data is concerned. To ensure the data security in cloud Data access control is an effective way. But due to the untrusted cloud servers, data access contoll becomes a challenging issue in cloud storage systems. However after attribute revocation if we have to provide security through re-encryption, then this is not given.In this paper we proposed re-encryption-based attribute revocation schemes by relying on a trusted server and we apply it as underlying techniques to design the data access control scheme. Our re-encryption method can efficiently provide both forward security and backward security.

Keywords: Data access control, Attribute Revocation, Re-encryption

Edition: Volume 5 Issue 3, March 2016

Pages: 1208 - 1210

Share this Article

How to Cite this Article?

Kalyani G. Kotangale, Milind Penurkar, "Survey on Re-encryption based Attribute Revocation in Data Access Control for Multi-Authority Cloud Storage", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV162123, Volume 5 Issue 3, March 2016, 1208 - 1210

117 PDF Views | 94 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data access control'

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 3, March 2016

Pages: 1208 - 1210

Survey on Re-encryption based Attribute Revocation in Data Access Control for Multi-Authority Cloud Storage

Kalyani G. Kotangale, Milind Penurkar

Share this Article

Similar Articles with Keyword 'Attribute Revocation'

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 3, March 2016

Pages: 1208 - 1210

Survey on Re-encryption based Attribute Revocation in Data Access Control for Multi-Authority Cloud Storage

Kalyani G. Kotangale, Milind Penurkar

Share this Article

Similar Articles with Keyword 'Re-encryption'

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 3, March 2016

Pages: 1208 - 1210

Survey on Re-encryption based Attribute Revocation in Data Access Control for Multi-Authority Cloud Storage

Kalyani G. Kotangale, Milind Penurkar

Share this Article

Survey Paper, Information Technology, India, Volume 2 Issue 1, January 2013

Pages: 212 - 216

Survey on Security Challenge for Data forwarding in Cloud

Tushar A. Rane, Shrishail T. Patil, Anita H. Khade

Share this Article
Top