Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Constant-size cipher text in Cloud computing”

Author : Mr. Kulkarni O.S 1 Miss. Jasud D.S 2 Miss. Gunde P.R 3 Mr.Chavan A.B 4 Mr. Patil R.M. 5

Date of Publication :15th February 2017

Abstract: Cloud computing refers to the practice of transitioning computer services such as computation or data storage to multiple redundant offsite locations available on the Internet, which allows application software to be operated using internetenabled devices. Clouds can be classified as public, private, and hybrid. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. It relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Since the cloud computing environment is distributed and un trusted, data owners have to encrypt outsourced data to enforce confidentiality. To achieve practicable access control of encrypted data in a un trusted environment is an urgent issue that needs to be solved. Attribute-Based Encryption (ABE) is a promising scheme suitable for access control in cloud storage systems. This system proposes a hierarchical attribute-based access control scheme with constant-size cipher text.

Reference :

    1. “Attribute-based Access Control “,H Ahn, H Chang, C Jang, E Choi, 2011.
    2. “Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures”, W. Itani, A. Kayssi, and A. Chehab, 2009.
    3. “Taking account of privacy when designing cloud computing services”, S. Pearson, 2009.
    4. “Security and privacy challenges in cloud computing environments”, H. Takabi, J. B. D. Joshi, and G. Ahn, 2010

Recent Article