earticle

논문검색

Defending of Trusted Access Control in Cloud Computing

초록

영어

The privacy of the information against the cloud was assured by the technique of encryption and the usage of approaches of conventional encryption is not enough to hold up the access control policies of fine-grained organizational enforcement. Throughout the initial encryption and subsequent re-encryptions, scheme of two layer of encryption was developed that diminishes the overhead sustained by the owner. During the addition or removal of identity attributes the owner has no need to re-encrypt the data since the essential re-encryptions were performed by the cloud to implement the access control policies and consequently the two layer of encryption approach reduces the overhead of computation and communication at the owner. In the approach of two layer of encryption, the time of running at the cloud is superior to that at the owner in view of the fact that the cloud performs encryption of fine grained while the owner only carries out coarse grained encryption.

목차

Abstract
 1. Introduction
 2. Methodology
 3. Results
 4. Conclusion
 References

저자정보

  • Venkata Naresh Mandhala Information Technology Department, VFSTR University,Vadlamudi-522213, Guntur, India
  • Siva Koteswara Rao Chinnam Information Technology Department, VFSTR University, Vadlamudi-522213, Guntur, India
  • Tai-hoon Kim Department of Convergence Security, Sungshin Women's University

참고문헌

자료제공 : 네이버학술정보

    ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

    0개의 논문이 장바구니에 담겼습니다.