An Integrated Access Structure and Encryption Scheme for Adequate Cloud Files: A Review

Authors

  • Gnanendra Y Dept. of Computer Applications, Sree Vidyanikethan Institute of Management, Tirupati, India
  • Basha KT Dept. of Computer Applications, Sree Vidyanikethan Institute of Management, Tirupati, India

Keywords:

Cipher textual content-coverage characteristic, based totally encryption (cp-abe), cloud computing, adequate cloud files encryption

Abstract

Cipher textual content-coverage characteristic-based totally encryption (cp-abe) has been a desired encryption technology to clear up the difficult problem of comfy details sharing in CC. the shared information documents commonly has the function of multilevel hierarchy, mainly inside the place of healthcare and the military. But, the hierarchy shape of shared documents has been not explored in older systems. on this paper, a green record hierarchy function-based encryption concept is proposed in cloud computing. The layered get admission to structures are included into a unmarried right wing after which the hierarchical files are encrypted with the incorporated get right of entry to format. The cipher text additives associated with attributes may be shared thru way of the documents. Therefore, each cipher text storage and time charge of encryption is saved. Moreover, the proposed scheme is proved to be cozy under the equal vintage assumption. our experimental simulation indicates the proposed scheme that is quite in phrases of encryption and decryption

References

[1] agrawal, william bolosky, john douceur, and jacob lorch 5-12 months observe of record-device metadata. in rapid’07, feb. 2007.

[2]anand, sen, krioukov avoiding document machine micromanagement with variety writes. in osdi’08, dec. 2008. ieee transactions on pc systems,quantity:sixty five,issue:6,difficulty date :june.1.2016 14

[3] a. batsakis, r. burns, a. kanevsky, j. lentini, and t. talpey. awol: an adaptive write optimizations layer. in rapid’08, feb. 2008.

[4] p. carns, okay. harms, w. allcock, c. sir francis Francis Bacon, s. lang, r. latham, and r. ross. knowledge and improving computational technological know-how storage get right of access to through non-stop characterization. acm transactions on storage, 7(3):1–26, 2011.

[5] f. chen, t. luo, and x. zhang. caftl: a content material fabric-conscious flash translation layer enhancing the lifespan of flash reminiscence based totally robust kingdom drives. in fast’eleven, pages seventy seven–ninety, feb. 2011.

[6] a. t. clements, i. ahmad, m. vilayannur, and j. li. decentralized deduplication in san cluster record systems. in usenix atc’09, jun. 2009.

[7] l. costa, s. al-kiswany, r. lopes, and m. ripeanu. assessing information deduplication trade-offs from an electricity mind-set. in erss’11, jul. 2011.

[8] a. el-shimi, r. kalach, a. kumar, a. oltean, j. li, and s. sengupta. primary information deduplication - big scale look at and system layout. in usenix atc’12, jun. 2012.

Downloads

Published

2025-11-25

How to Cite

[1]
Y. Gnanendra and K. T. Basha, “An Integrated Access Structure and Encryption Scheme for Adequate Cloud Files: A Review”, Int. J. Comp. Sci. Eng., vol. 7, no. 6, pp. 125–127, Nov. 2025.