Attribute Based Secure Data Access in Cloud Computing
نویسنده
چکیده
Cloud computing enables highly scalable services to be easily consumed over the Internet on an asneeded basis. Attribute Based Secure Data Access has proposed for access control of outsourced data in cloud computing. The person wants to sale their business logic to some others with attractive mechanism for showing the restricted portion. The idea proposed the business people have secure Uploading the File with secret key and also set the price of their logic. The user cannot access the full logic without paying, after settle the payment user can receive the key through the mail. After every transaction the original key has changed, and the new key is automatically generate and send to the data owner. In this paper, each business people have separate location for storing the file (business logic) and viewer (user) have restricted access, so that they are only viewing the certain portions. The Auditor maintaining the accessed and non-accessed business logic file depends upon user those who read the logics. Main theme of these project presents who are earned great business logic and share those logic to some other weakest business people as well as they earned certain amount of money for their idea. Small scale industry using the business logic behalf of veteran business men logic and the achieving their business growth. Keywords— Business logic(Bl),Dynamic Audit(DA),Storage Security(SS),Cloud Storage Service(CSS),Knuth Morris Pratt(KMP)
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملData Replication-Based Scheduling in Cloud Computing Environment
Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...
متن کاملDesign and Implementation of Collaborative Ciphertext-Policy Attribute-Role based
In a real-world collaborative data sharing scenario in cloud computing, there are multiple users who can access the resource shared by multiple data owners anytime and anywhere. The evolution of user status, roles, and privilege in the federated data sharing environment become even more and more complex to handle. Efficiently managing multiple access control policies and providing appropriate a...
متن کاملParallel search over encrypted data under attribute based encryption on the Cloud Computing
Data confidentiality in the Cloud Computing is a very challenging task. Encryption is one of the most secure methods ensuring this task, and searchable encryption techniques are used to search on encrypted data without the need for decryption. But, despite this secure measure some leaks may appear when searching over data. In this article, we propose to improve confidentiality of outsourced dat...
متن کامل