Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

TMACS-A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

Author : Shivprasad S. Nardele 1 Amol S. vilegave 2 Abhijeet S.Thete 3

Date of Publication :12th April 2017

Abstract: Distributed computing is ascending as a prevalent data keen perspective to make sense of it customers data remotely set away in an online cloud server. Cloud organizations give unfathomable facilities for the customers to value the on demand cloud applications without considering the close-by system imperatives. In the midst of the data getting to different customers may be in a synergistic relationship and thusly data sharing gets the opportunity to be tremendous to achieve beneficial advantages.We propose a typical power based security saving affirmation tradition SAPA to address past security issue for cloud limit. In the SAPA shared get the opportunity to power is finished by obscure get the chance to ask organizing framework with security and assurance thoughts e.g. approval data lack of clarity customer insurance and forward security, property based get the chance to control is grasped to get it that the customer can simply get to its own specific data fields middle person re-encryption is associated by the cloud server to give data sharing among the various clients.In earlier figuring world there is on one and just power that manages for client or customer obstructions of this advancement is in case control gets down then security of that cloud in like manner deals

Reference :

    1. Z. Wan, J. Liu, and R. Deng, Hasbe: a hierarchical attribute based solution for flexible and scalable access control in cloud computing, IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 743754, 201
    2. S. Yu, C. Wang, K. Ren, and W. Lou, Achieving secure, scalable, and engrained data access control in cloud computing, in Proceedings of the29thIEEE International Conference on Computer Communications. IEEE, 2010, pp. 19.
    3. S. Patil, P. Vhatkar, and J. Gajwani, Towards secure and depend- able storage services in cloud computing, International Journal of Innovative Research in Advanced Engineering, vol. 1, no. 9, pp. 5764, 2014.
    4. T. Pedersen, A threshold cryptosystem without a trusted party, in Proceedings of the 10th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer,1991, pp. 522526.
    5. K.YangandX. Jia, Expressive, efficient and revocable data access control for multi authority cloud storage, IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 7, pp. 17351744, 2013.

Recent Article