Access Control in Cloud Computing Based on Broadcast Group Key Management

Access Control in Cloud Computing Based on Broadcast Group Key Management
Authors:UDDAGIRI SIRISHA, DR.S.MADHAVI

Abstract: In the most recent a few years, cloud computing has developed as a standout amongst the most powerful standards in the IT business, and has became a broad consideration from both the scholarly world and business. In cloud computing, Cloud File storage needs users to handover their valuable data to Cloud Providers (CP). Due to this situation, the security and privacy of the outsourced data by the users became an issue. Several plans for access control of outsourced data were proposed earlier, in that Attribute-Based encryption (ABE) is one. Later on, because of its difficult implementation over complex access control policies, we proposed an adaptable and fine-grained access control plan called hierarchical attribute-set-based encryption (HASBE) with a hierarchical structure of users. After that we joined the advantages of HASBE plan with a new plan called broadcast group key management (BGKM) that uses dynamic key generation based on identity attributes and public information. To deal with the access control of outsourced data in distributed or cloud computing, the implementation of this proposed plan i.e. HASBE with BGKM is proficient and easy. 

Keywords: Cloud Computing, Access Control, Data Security, ABE, HASBE, BGKM. 

INTRODUCTION 
        Cloud computing is novel model that is based on virtualization, parallel and distributed, utility processing, and administration arranged building design. In the most recent a few years, distributed or cloud computing has developed as a standout amongst the most powerful standards in the IT business, and has pulled in broad consideration from both the scholarly world and business. The profits of distributed or cloud computing incorporate lessened expenses and capital consumptions, expanded operational efficiencies, adaptability, quick time to market, et cetera. Various business distributed computing frameworks have been manufactured at distinctive levels. With these cloud computing frameworks, on one hand, undertaking clients no more need to put resources into fittings/programming frameworks or contract IT experts to keep up these IT frameworks, accordingly they spare cost on IT framework and human assets; processing utilities provided by cloud computing are consistently offered at a moderately low cost in a pay-as-you-utilize style. In spite of the fact that the extraordinary profits conveyed by cloud computing standards are energizing for IT organizations, scholarly scientists, and potential cloud clients, security issues in distributed computing get to be not kidding snags which, without being fittingly tended to, will anticipate cloud computing far reaching applications and use later on.

                                                                              Read More....




No comments:

Post a Comment