Home > Engineering > Computer Engineering > Volume-2 > Issue-3 > Key-Aggregate Based Vulnerable Data Access Control in Cloud Computing

Key-Aggregate Based Vulnerable Data Access Control in Cloud Computing

Call for Papers

Volume-8 | Issue-6

Last date : 27-Dec-2024

Best International Journal
Open Access | Peer Reviewed | Best International Journal | Indexing & IF | 24*7 Support | Dedicated Qualified Team | Rapid Publication Process | International Editor, Reviewer Board | Attractive User Interface with Easy Navigation

Journal Type : Open Access

First Update : Within 7 Days after submittion

Submit Paper Online

For Author

Research Area


Key-Aggregate Based Vulnerable Data Access Control in Cloud Computing


Sowmiya. S | Dr. T. Priyaradhikadevi

https://doi.org/10.31142/ijtsrd11633



Sowmiya. S | Dr. T. Priyaradhikadevi "Key-Aggregate Based Vulnerable Data Access Control in Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3, April 2018, pp.1962-1965, URL: https://www.ijtsrd.com/papers/ijtsrd11633.pdf

In the developing technologies in the computers the cloud computing is one the way to provide services through the internet to the users in the efficient manner. Cloud based services not only provide users with convenience, but also bring many security issues. The user can store his data in the cloud service. Although cloud computing brings great convenience to enterprises and users, the cloud computing security has always been a major hazard. For users, it is necessary to take full advantage of cloud storage service, and also to ensure data privacy. The system proposed a fine-grained two-factor authentication (2FA) access control system, 2FA access control system, an attribute-based access control mechanism is implemented with the necessity of both user secret key and a BBS+ Signatures. The mechanism implemented using CP-IBE(cipher text identity based encryption) and digit signature authority, compare to existing method which provide the paranoid security and achieving the secure data access in cloud computing.

access control; data sharing; privacy protection; cloud-based services


IJTSRD11633
Volume-2 | Issue-3, April 2018
1962-1965
IJTSRD | www.ijtsrd.com | E-ISSN 2456-6470
Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)

International Journal of Trend in Scientific Research and Development - IJTSRD having online ISSN 2456-6470. IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas like Sciences, Technology, Innovation, Engineering, Agriculture, Management and many more and it is recommended by all Universities, review articles and short communications in all subjects. IJTSRD running an International Journal who are proving quality publication of peer reviewed and refereed international journals from diverse fields that emphasizes new research, development and their applications. IJTSRD provides an online access to exchange your research work, technical notes & surveying results among professionals throughout the world in e-journals. IJTSRD is a fastest growing and dynamic professional organization. The aim of this organization is to provide access not only to world class research resources, but through its professionals aim to bring in a significant transformation in the real of open access journals and online publishing.

Thomson Reuters
Google Scholer
Academia.edu

ResearchBib
Scribd.com
archive

PdfSR
issuu
Slideshare

WorldJournalAlerts
Twitter
Linkedin