High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Protected Self-immolation Strategy in Cloud Computing

Author(s):

Ayesha N. Shikalgar , P.G.M.C.O.E; Aishwarya Dhobale, P.G.M.C.O.E; Pranali Talghade, P.G.M.C.O.E; Arti Kumari, P.G.M.C.O.E

Keywords:

Self-destructing, Privacy-Preserving, Sensitive information, Fine-grained access, Privacy-protection, Cloud Computing

Abstract

With the quick development of versatile cloud services, it becomes extra and additional liable to use cloud services to share knowledge in associate passing friend circle among the cloud computing surroundings, Since it isn't potential to implement full life cycle privacy security, access management becomes a tough task, significantly when we tend to share sensitive data on cloud servers, thus on tackle this drawback, we've got an inclination to propose a key-policy attribute-based secret writing with time-specified attributes (KP-ABTS), a novel secure data self-destructing theme in cloud computing, among the KP-ABTS theme, each cipher text is labeled with a amount whereas personal secrets associated with a time instant, the cipher text can solely be decrypted, if every the time instant is among the allowed amount and so the attributes related to the cipher text satisfy the key’s access structure. The KP-ABTS is in a place to resolve some necessary security problems by supporting user outlined authorization quantity and by providing fine-grained access management throughout the quantity, the sensitive info are aiming to be firmly self-destructed once a user-specified expiration time, the KP-ABTS theme is tried to be secure beneath the choice l-bilinear Diffie-Hellman inversion (l-Expanded BDHI) presumption, comprehensive distinction of the protection properties indicate that the KP-ABTS theme planned by USA satisfies the protection wants and is superior to alternative existing schemes.

Other Details

Paper ID: IJSRDV4I10069
Published in: Volume : 4, Issue : 1
Publication Date: 01/04/2016
Page(s): 61-63

Article Preview

Download Article