High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Survey on Secure and Verifiable Access Control Scheme for Cloud Computing


Namith Rajan , Dr.D.Y Patil Institute of Technology; Abhay Deshpande, Dr.D.Y Patil Institute of Technology; Rohit Thorat, Dr.D.Y Patil Institute of Technology; Shubham Sarolkar, Dr.D.Y Patil Institute of Technology; Dipti Chaudhari, Dr.D.Y Patil Institute of Technology


Encryption, Decryption, Integrity, Ownership


Due to the quality and volume, outsourcing data to a cloud is deemed to be one in all the foremost effective approaches for large knowledge storage and access. With increase in number of users the amount of data being stored on the cloud has substantially increased. The access legitimacy of a user firmly depends on the ciphertext policy accepted by the owner. Ancient approaches either fully ignore the difficulty of access policy update or delegate the update to a 3rd party authority. There are always possibilities of duplicate data on cloud. This paper has discussed various development their advantages and limitations of different encryptions.

Other Details

Paper ID: IJSRDV6I20101
Published in: Volume : 6, Issue : 2
Publication Date: 01/05/2018
Page(s): 50-51

Article Preview

Download Article