A Multi User Data Share For Data Privacy and Defend Un-authorized Access
Abstract
A hierarchical access control method using a modified hierarchical attribute-based encryption (M-HABE) and an adjusted three-layer structure is proposed. Varying from the current ideal models, for example, the HABE calculation and the first three-layer structure, the novel plan essentially concentrates on the information preparing, putting away and getting to, which is intended to guarantee the application clients with lawful get to specialists to get comparing detecting information and to limit unlawful clients and unapproved legitimate clients access the information, the proposed promising worldview makes it to a great degree appropriate for the portable distributed computing based worldview. What ought to be underlined is that the most imperative highlight of all in the proposed work can be depicted as that the altered three-layer structure is intended for understanding the security issues.
References
N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: A survey,†Future Generation Computer Systems, vol. 29, no. 1, pp. 84–106, 2013.
S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and R. Buyya, “Cloud based augmentation for mobile devices: motivation, taxonomies, and open challenges,†Communications Surveys & Tutorials, IEEE, vol. 16, no. 1, pp. 337–368, 2014.
R. Kumar and S. Rajalakshmi, “Mobile cloud computing: Standard approach to protecting and securing of mobile cloud ecosystems,†in Computer Sciences and Applications (CSA), 2013 International Conference on. IEEE, 2013, pp. 663–669.
J. Carolan, S. Gaede, J. Baty, G. Brunette, A. Licht, J. Remmell, L. Tucker, and J. Weise, “Introduction to cloud computing architecture,†White Paper, 1st edn. Sun Micro Systems Inc, 2009.
E. E. Marinelli, “Hyrax: cloud computing on mobile devices using mapreduce,†DTIC Document, Tech. Rep., 2009.
Q. Han, S. Liang, and H. Zhang, “Mobile cloud sensing, big data, and 5g networks make an intelligent and smart world,†Network, IEEE, vol. 29, no. 2, pp. 40–45, 2015.
I. Stojmenovic, “Access control in distributed systems: Merging theory with practice,†in Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, 2011, pp. 1–2.
G. Wang, Q. Liu, and J. Wu, “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,†in Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010, pp. 735–737.
C. Gentry and A. Silverberg, “Hierarchical id-based cryptography,†in Advances in cryptologyASIACRYPT 2002. Springer, 2002, pp. 548–566.
J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute based encryption,†in Security and Privacy, 2007. SP’07. IEEE Symposium on. IEEE, 2007, pp. 321–334.
A. Shamir, “Identity-based cryptosystems and signature schemes,†in Advances in cryptology. Springer, 1985, pp. 47–53.
M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, “Security and privacy in cloud computing: A survey,†in Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on. IEEE, 2010, pp. 105–112.
B. Grobauer, T. Walloschek, and E. St¨ocker, “Understanding cloud computing vulnerabilities,†Security & privacy, IEEE, vol. 9, no. 2, pp. 50–57, 2011.
S. Ghemawat, H. Gobioff, and S.-T. Leung, “The google file system,†in ACM SIGOPS operating systems review, vol. 37, no. 5. ACM, 2003, pp. 29–43.
M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, “Security and privacy in cloud computing: A survey,†in Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on. IEEE, 2010, pp. 105–112.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â