Attribute Based Secure Data Access in Cloud Computing

نویسنده

  • Abdul Rahim
چکیده

Cloud computing enables highly scalable services to be easily consumed over the Internet on an asneeded basis. Attribute Based Secure Data Access has proposed for access control of outsourced data in cloud computing. The person wants to sale their business logic to some others with attractive mechanism for showing the restricted portion. The idea proposed the business people have secure Uploading the File with secret key and also set the price of their logic. The user cannot access the full logic without paying, after settle the payment user can receive the key through the mail. After every transaction the original key has changed, and the new key is automatically generate and send to the data owner. In this paper, each business people have separate location for storing the file (business logic) and viewer (user) have restricted access, so that they are only viewing the certain portions. The Auditor maintaining the accessed and non-accessed business logic file depends upon user those who read the logics. Main theme of these project presents who are earned great business logic and share those logic to some other weakest business people as well as they earned certain amount of money for their idea. Small scale industry using the business logic behalf of veteran business men logic and the achieving their business growth. Keywords— Business logic(Bl),Dynamic Audit(DA),Storage Security(SS),Cloud Storage Service(CSS),Knuth Morris Pratt(KMP)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Data Replication-Based Scheduling in Cloud Computing Environment

Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...

متن کامل

Design and Implementation of Collaborative Ciphertext-Policy Attribute-Role based

In a real-world collaborative data sharing scenario in cloud computing, there are multiple users who can access the resource shared by multiple data owners anytime and anywhere. The evolution of user status, roles, and privilege in the federated data sharing environment become even more and more complex to handle. Efficiently managing multiple access control policies and providing appropriate a...

متن کامل

Parallel search over encrypted data under attribute based encryption on the Cloud Computing

Data confidentiality in the Cloud Computing is a very challenging task. Encryption is one of the most secure methods ensuring this task, and searchable encryption techniques are used to search on encrypted data without the need for decryption. But, despite this secure measure some leaks may appear when searching over data. In this article, we propose to improve confidentiality of outsourced dat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013