Privacy Preserving Public Auditing with Data Storage Security in Cloud Computing : An Overview
DOI:
https://doi.org/10.26438/ijcse/v6i5.532534Keywords:
CP-ABE, ABS, XACMLAbstract
Cloud computing is an Internet-based computing pattern through which shared resources are provided to devices on demand. In order to provide safe and secure operation propose a hierarchical attribute based access control scheme by extending cipher text-policy attribute-based encryption (CP-ABE) with a hierarchical structure of multi authorities and exploiting attribute-based signature (ABS). The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits fine-grained access control with authentication in supporting write privilege on outsourced data in cloud computing. In addition, we decouple the task of policy management from security enforcement by using the extensible access control markup language (XACML) framework. Extensive analysis shows that our scheme is both efficient and scalable in dealing with access control for out- sourced data in cloud computing.
References
https://apprenda.com/library/cloud/introduction-to-cloud-computing/
https://www.hindawi.com/journals/scn/2017/2713595/
https://eprint.iacr.org/2014/612.pdf
R. Nallakumar, N. Sengottaiyan, S. Nithya, “A Survey of Task Scheduling Methods in Cloud Computing”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.10, pp.9-13, 2014. https://www.hindawi.com/journals/scn/2017/2713595/
S. Roschke, et aI., "Intrusion Detection in the Cloud," presented at the Eighth IEEE International Conference on Dependable, AutonomIc and Secure Computing, Chengdu, China, 2009.
B.P. Rimal, Choi Eunmi, I. Lumb, “A Taxonomy and Survey of Cloud Computing Systems”, Intl. Joint Conference on INC, IMS and IDC, 2009, pp. 44-51,Seoul, Aug, 2009. DOI: 10.1109/NCM.2009.218
B. R. Kandukuri, R. Paturi V, A. Rakshit, “Cloud Security Issues”, In Proceedings of IEEE International Conference on Services Computing, pp. 517-520, 2009. K. Elissa, “Title of paper if known,” unpublished.
Cloud Computing. Wikipdia. Available at http://en.wikipedia.org/wiki/Cloud_computing
Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, “Ensuring Data Storage Security in Cloud Computing,” 17th International workshop on Quality of Service, USA, pp.1-9, July 13-15, 2009, ISBN: 978-1-4244-3875-4
C. Weinhardt, A. Anandasivam, B. Blau, and J. Stosser.”Business Models in the Service World.”IT Professional, vol. 11, pp. 28-33, 2009.
B. Patel, S. Patel, “Various Load Balancing Algorithms in cloud computing”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol¬.1, Issue.¬2 pp.23-29, 2015.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
