Investigation on Revocable Fine-grained Access Control Scheme for Multi-Authority Cloud Storage Systems
B.Natraj Kumar, M.Sri Lakshmi, Dr S.Prem Kumar, ,
Affiliations (M.Tech), CSE, Assistant professor Department of Computer Science and EngineeringAssistant Professor, Department of Computer Science and EngineeringProfessor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
Cloud computing is one of the emerge technologies in order to outsource huge volume of data inters of storage and sharing. To
protect the data and privacy of users the access control methods ensure that authorized users access the data and the system. Fine grainedapproach is the appropriate method for data access control in cloud storage. However, CP-ABE schemes to data access control for cloud
storage systems are difficult because of the attribute revocation problem. Specifically, in this paper we investigate on revocable multi-authority
B.Natraj Kumar,M.Sri Lakshmi,Dr S.Prem Kumar."Investigation on Revocable Fine-grained Access Control Scheme for Multi-Authority Cloud Storage Systems". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 08,pp.486-491, August - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I806.pdf,
. S.Yu, C.Wang, K.Ren, and W.Lou, „„Attribute Based Data Sharing with Attribute Revocation,‟ ‟ in Proc. 5th ACM Symp. Information, Computer and Comm. Security (ASIACCS‟ 10), 2010, pp. 261-270.
. J. Hur and D.K. Noh, „„Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems,‟ ‟ IEEE Trans. Parallel Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011.
.S.Jahid, P.Mittal, and N.Borisov, „„Easier: EncryptionBased Access Control in Social Networks with Efficient Revocation,‟ ‟ in Proc. 6th ACM Symp. Information, Computer and Comm. Security (ASIACCS‟ 11), 2011, pp. 411-415.
.M. Li, S. Yu, Y. Zheng, K. Ren, andW.Lou, „„Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,‟ ‟ IEEE Trans. Parallel Distributed Systems, vol. no. 1, pp. 131-143, Jan. 2013. 24,
.Kan Yang, and Xiaohua Jia, „„Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage,‟ ‟ IEEE transactions on parallel and distributed systems, vol. 25, no. 7, july 2014.
 MrSanthoshkumarB.J, M.Tech, Amrita VishwaVidyapeetham, Mysore Campus, India “Attribute Based Encryption with Verifiable Outsourced Decryption.” In International Journal of Advanced Research in Computer Science and Software Engineering”Volume 4, Issue 6, June 2014,ISSN: 2277 128X.
Tejaswini R M1, Roopa C K2 , Ayesha Taranum “Securing Cloud Server & Data Access withMultiAuthorities” International Journal of Computer Science and Information Technology Research ISSN 2348-120X Vol. 2, Issue 2, pp: (297-302), Month: April-June 2014,
We have kept IJCERT is a free peer-reviewed scientific journal to endorse conservation. We have not put up a paywall to readers, and we do not charge for publishing. But running a monthly journal costs is a lot. While we do have some associates, we still need support to keep the journal flourishing. If our readers help fund it, our future will be more secure.