Access Control in Cloud Computing Based on Broadcast Group Key Management
Authors:UDDAGIRI SIRISHA, DR.S.MADHAVI
Read More....
Authors:UDDAGIRI SIRISHA, DR.S.MADHAVI
Abstract: In the most recent a few years, cloud computing has developed as a standout amongst the most powerful standards in
the IT business, and has became a broad consideration from both the scholarly world and business. In cloud computing, Cloud
File storage needs users to handover their valuable data to Cloud Providers (CP). Due to this situation, the security and privacy
of the outsourced data by the users became an issue. Several plans for access control of outsourced data were proposed earlier,
in that Attribute-Based encryption (ABE) is one. Later on, because of its difficult implementation over complex access control
policies, we proposed an adaptable and fine-grained access control plan called hierarchical attribute-set-based encryption
(HASBE) with a hierarchical structure of users. After that we joined the advantages of HASBE plan with a new plan called
broadcast group key management (BGKM) that uses dynamic key generation based on identity attributes and public
information. To deal with the access control of outsourced data in distributed or cloud computing, the implementation of this
proposed plan i.e. HASBE with BGKM is proficient and easy.
Keywords: Cloud Computing, Access Control, Data Security, ABE, HASBE, BGKM.
INTRODUCTION
Cloud computing is novel model that is based on
virtualization, parallel and distributed, utility processing,
and administration arranged building design. In the most
recent a few years, distributed or cloud computing has
developed as a standout amongst the most powerful
standards in the IT business, and has pulled in broad
consideration from both the scholarly world and business.
The profits of distributed or cloud computing incorporate
lessened expenses and capital consumptions, expanded
operational efficiencies, adaptability, quick time to market,
et cetera. Various business distributed computing
frameworks have been manufactured at distinctive levels.
With these cloud computing frameworks, on one hand,
undertaking clients no more need to put resources into
fittings/programming frameworks or contract IT experts to
keep up these IT frameworks, accordingly they spare cost
on IT framework and human assets; processing utilities
provided by cloud computing are consistently offered at a
moderately low cost in a pay-as-you-utilize style. In spite of
the fact that the extraordinary profits conveyed by cloud
computing standards are energizing for IT organizations,
scholarly scientists, and potential cloud clients, security
issues in distributed computing get to be not kidding snags
which, without being fittingly tended to, will anticipate
cloud computing far reaching applications and use later on.
No comments:
Post a Comment