Efficient and Flexible Access Control for Outsourced Data In Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 12
Abstract
This paper presents a scheme achieves scalability and also inherits flexibility and finegrained access control in supporting compound attributes of ASBE . In the other hand HASBE implement multiple value assignments for access expiration time to deal with user revocation more efficiently than existing schemes. Later we prove the security of HASBE based on the cipher textpolicy attribute-based encryption (CP-ABE) scheme by Bethencourt et al. and analyze its performance and computational complexity. We implement our scheme and show that it is both efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments.
Authors and Affiliations
K. V. Srinivasa Rao, R. V. Satyanarayana
Design of Modulo 2n-1 based on Radix-8 Algorithm for RNS & MAC Applications
A new architecture, namely, Multiplier-and Accumulator (MAC) based Radix-8 Booth Encoded modulo 2n-1 Multiplication Algorithm for high-speed arithmetic logics have been proposed and implemented on Xilinx FPGA device....
A New Heuristic Approach For Hide Valuable Information Of Organizations
Organizations accumulate and analyze customer data to pick up their services. Access Control Mechanisms(ACM) is used to make sure that only authorized information is on hand to users. Onthe other hand, sensitive info...
Advanced Home Security System.
Domestic security recently has started making a significant mark in the life of people throughout the globe. And hence more and more advanced systems are developed each day to enhance domestic security. But most of t...
BLIND SOURCE SEPARATION OF PARTIAL AND FULL TRANSPARENCY IMAGE USING IMAGE SEPARATION ALGORITHM
The problem of blind separation of multiple source layers from their linear mixtures with unknown mixing coefficients and unknown layer motions. Such mixtures or Full Transparency or Superimposed image can occur when...
Design of a System Providing Customizable Content-Based Message filtering for OSN’s
For communication and sharing information, Online Social Networks (OSN’s) are being used by everyone is to give users the capability to organize the messages posted on their own private space to keep away from thesur...