Author : Divyabharathi A 1
Date of Publication :7th March 2016
Abstract: Security is provided to files uploaded in cloud environment. Cloud is divided into three levels top level, regional and end user.The head can have the control over both regional and end users and can access their files without any permission but the users in the regional level have to send request to the head if they want to access the files in the top level. Similarly the end users have to send request to their respective regional levels to get their files downloaded. If their request is not accepted the file will be in the format of cipher text which is some meaningless information
Reference :
-
- Gregory M .coates , Kenneth M . kopkinson , Scott R . Graham and Stuart kurkowskimembers,IEEE(2010) A trusted system architecture for SCADA network security,IEEE,vol.25,no.1,January,pg,no.158
- XiFang,SatyajayantMisra,Guoliangxue,Dejungyan,m embers IEEE(2012), Managing smart grid information in thecloud:opportunities,model,andapplications,IEEE,vol.26, July-August, pg, no.32
- G. Ateniese, K. Fu, M. Green, and S.Hohenberger, “Improved proxy reencryptionschemes with applications to secure distributed storage,” ACM Trans. Inf. Syst. Security, vol. 9, no. 1, pp. 1–30, 2006
- H.Li, Y. Dai, L. Tian, and H. Yang, “Identity-based authentication for cloud computing,” in Proc. 1st Int. Conf. Cloud Comput., 2009, vol. 5931, pp. 157–166.
- D. Boneh and M. K. Franklin, “Identity-based encryption from the weil pairing,” in Proc. 21st Annu. Int. Cryptol. Conf. Adv. Cryptol., 2001, vol. 2139, pp. 213–229
- X. Boyen, “A tapestry of identity-based encryption: practical frameworks compared,” Int. J. Appl. Cryptograph., vol. 1, no. 1, pp. 3–21, 2008