Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Secured Access of Data Using Cloud Computing

Author : Divyabharathi A 1 Divyamira R 2 Janani V 3 Siva R 4

Date of Publication :7th March 2016

Abstract: Security is provided to files uploaded in cloud environment. Cloud is divided into three levels top level, regional and end user.The head can have the control over both regional and end users and can access their files without any permission but the users in the regional level have to send request to the head if they want to access the files in the top level. Similarly the end users have to send request to their respective regional levels to get their files downloaded. If their request is not accepted the file will be in the format of cipher text which is some meaningless information

Reference :

    1. Gregory M .coates , Kenneth M . kopkinson , Scott R . Graham and Stuart kurkowskimembers,IEEE(2010) A trusted system architecture for SCADA network security,IEEE,vol.25,no.1,January,pg,no.158
    2. XiFang,SatyajayantMisra,Guoliangxue,Dejungyan,m embers IEEE(2012), Managing smart grid information in thecloud:opportunities,model,andapplications,IEEE,vol.26, July-August, pg, no.32
    3. G. Ateniese, K. Fu, M. Green, and S.Hohenberger, “Improved proxy reencryptionschemes with applications to secure distributed storage,” ACM Trans. Inf. Syst. Security, vol. 9, no. 1, pp. 1–30, 2006
    4. H.Li, Y. Dai, L. Tian, and H. Yang, “Identity-based authentication for cloud computing,” in Proc. 1st Int. Conf. Cloud Comput., 2009, vol. 5931, pp. 157–166.
    5. D. Boneh and M. K. Franklin, “Identity-based encryption from the weil pairing,” in Proc. 21st Annu. Int. Cryptol. Conf. Adv. Cryptol., 2001, vol. 2139, pp. 213–229
    6. X. Boyen, “A tapestry of identity-based encryption: practical frameworks compared,” Int. J. Appl. Cryptograph., vol. 1, no. 1, pp. 3–21, 2008

Recent Article