Abstract

In this work, a hierarchical access control method using a modified hierarchical attribute-based encryption (M-HABE) and a modified three-layer structure is proposed. Varying from the current ideal models, for example, the HABE algorithm and the first three-layer structure, the novel plan principally centres around the information handling, putting away and getting to, which is intended to guarantee the application clients with legitimate access experts to get relating detecting information and to confine restrict illegal and unapproved lawful clients access the information, the proposed promising worldview makes it to a great degree reasonable for the portable distributed computing based worldview. What ought to be underlined is that the most imperative feature of all in the proposed paper can be depicted as that the altered three-layer structure is intended for unravelling the security issues outlined previously.

Authors and Affiliations

R. Leela| Dept Of Cs,Kakinada Institute Of Engineering And Technology,Korangi,E.G.Dist,A.P,India, T. kishore| Dept Of Cs,Kakinada Institute Of Engineering And Technology,Korangi,E.G.Dist,A.P,India

Keywords

Related Articles

Anomaly Detection on Firewall Logs from Multifold System Based on Email Classification

The greater part of the current frameworks sort the report or firewall logs-corpus in light of the term similitude by discover the archive term relationship. It can't distinguish the calculated comparability or conne...

New DC Voltage Balancing Technique for High Power Multilevel Converter

In this venture, a dedicated pulse width modulation (PWM) procedure particularly intended for single-stage (or four wire three-stage) multilevel Cascaded H-Bridge Converters is displayed. The point of the proposed me...

A dynamic power channel actualized with a four-leg voltage-source inverter utilizing a prescient control plot is exhibited. The utilization of a four-leg voltage-source inverter permits the pay of current consonant p...

A Survey on Random Grid based Cryptography Schemes

A random grid based non-expanded Visual cryptography scheme used to generate meaningful as well as meaningless shares. First, analyze the distribution of pixels on the share image and stack image. A probability alloc...

Empowering Auditing Scheme through more Security signatures in cloud computing

Maintaining data determined quality in public cloud acts an essential measure in cloud computing. Cloud storage auditing settles the multifaceted nature of data dependability in public cloud. In advance auditing prot...

Download PDF file
  • EP ID EP17054
  • DOI -
  • Views 294
  • Downloads 4

How To Cite

R. Leela, T. kishore (2018). . International Journal of Science Engineering and Advance Technology, 6(1), 15-18. https://europub.co.uk./articles/-A-17054