A Survey on Secure and Verifiable Access Control Scheme for Cloud Computing |
Author(s): |
Namith Rajan , Dr.D.Y Patil Institute of Technology; Abhay Deshpande, Dr.D.Y Patil Institute of Technology; Rohit Thorat, Dr.D.Y Patil Institute of Technology; Shubham Sarolkar, Dr.D.Y Patil Institute of Technology; Dipti Chaudhari, Dr.D.Y Patil Institute of Technology |
Keywords: |
Encryption, Decryption, Integrity, Ownership |
Abstract |
Due to the quality and volume, outsourcing data to a cloud is deemed to be one in all the foremost effective approaches for large knowledge storage and access. With increase in number of users the amount of data being stored on the cloud has substantially increased. The access legitimacy of a user firmly depends on the ciphertext policy accepted by the owner. Ancient approaches either fully ignore the difficulty of access policy update or delegate the update to a 3rd party authority. There are always possibilities of duplicate data on cloud. This paper has discussed various development their advantages and limitations of different encryptions. |
Other Details |
Paper ID: IJSRDV6I20101 Published in: Volume : 6, Issue : 2 Publication Date: 01/05/2018 Page(s): 50-51 |
Article Preview |
|
|