Privacy Protection on Cloud Computing with Auditing Scheme
Keywords:
Encryption, CP-ABE, Collusion AttackAbstract
Distributed computing gives an assortment of administrations to our current specialized regions. It is helpful for the two customers and organizations to utilize applications without access their own records. Security is an unavoidable component of our cloud administration. So we ought to make sure that our specialist organization can give the security to our information. Yet, various prominent hacking cases will prompt various sorts of safety issues on cloud. It for the most part happens in multi clients distributed computing regions Cloud security is significant in each field of clients. Everybody needs to give their data completely safe. For this reason, here we can utilize property-based encryption that is a kind of open key encryption. Characteristic based encryption permits information proprietors and clients to encode and decode in light of the individual ascribes. So we propose a audit scheme which gives a sort of security insurance on clients and keep from unapproved access from programmers.
References
K. Yang and X. Jia, “Expressive, efficient and revocable data access control for multi-authority cloud storage,” IEEE Transactions on Parallel and Distributed Systems, Vol.25, Issue.no.7,pp. 1733-1744 2013.
K. Xue and P. Hong, “A dynamic secure group sharing framework in public cloud computing,” IEEE Transactions on Cloud Computing, Vol. 2, Issue 4, pp. 459–470, 2014.
]. J. Han, W. Susilo, Y. Mu, J. Zhou, and M. H. A. Au, “Improving privacy and security in decentralized cipher text policy attribute-based encryption,” IEEE Transactions on Information Forensics and Security, Vol. 10, Issue. 3, pp. 665–678, 2015
K. Yang, X. Jia, and K. Ren, “Secure and verifiable policy update outsourcing for big data access control in the cloud,” IEEE Transactions on Parallel &Distributed Systems, Vol. 26, Issue 12, pp. 3461–3470, 2015.
W. Li, K. Xue, Y. Xue, and J. Hong, “TMACS:A robust and verifiable threshold multi-authority access control system in public cloud storage,” IEEE Transactions on Parallel & Distributed Systems, Vol. 27, Issue. 5, pp. 1484– 1496, 2016
Kai Fan1*, Qiong Tian1, Junxiong Wang1, Hui Li1, Yintang Yang2, “Privacy Protection Based Access Control Scheme in Cloud-Based Services” Vol.14,Issue.1,pp.61-71
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
