Open Access   Article Go Back

An Integrated Access Structure and Encryption Scheme for Adequate Cloud Files: A Review

Y. Gnanendra1 , K. Thanweer Basha2

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-06 , Page no. 125-127, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si6.125127

Online published on Mar 20, 2019

Copyright © Y. Gnanendra, K. Thanweer Basha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Y. Gnanendra, K. Thanweer Basha, “An Integrated Access Structure and Encryption Scheme for Adequate Cloud Files: A Review,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.125-127, 2019.

MLA Style Citation: Y. Gnanendra, K. Thanweer Basha "An Integrated Access Structure and Encryption Scheme for Adequate Cloud Files: A Review." International Journal of Computer Sciences and Engineering 07.06 (2019): 125-127.

APA Style Citation: Y. Gnanendra, K. Thanweer Basha, (2019). An Integrated Access Structure and Encryption Scheme for Adequate Cloud Files: A Review. International Journal of Computer Sciences and Engineering, 07(06), 125-127.

BibTex Style Citation:
@article{Gnanendra_2019,
author = {Y. Gnanendra, K. Thanweer Basha},
title = {An Integrated Access Structure and Encryption Scheme for Adequate Cloud Files: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {06},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {125-127},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=882},
doi = {https://doi.org/10.26438/ijcse/v7i6.125127}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.125127}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=882
TI - An Integrated Access Structure and Encryption Scheme for Adequate Cloud Files: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - Y. Gnanendra, K. Thanweer Basha
PY - 2019
DA - 2019/03/20
PB - IJCSE, Indore, INDIA
SP - 125-127
IS - 06
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cipher textual content-coverage characteristic-based totally encryption (cp-abe) has been a desired encryption technology to clear up the difficult problem of comfy details sharing in CC. the shared information documents commonly has the function of multilevel hierarchy, mainly inside the place of healthcare and the military. But, the hierarchy shape of shared documents has been not explored in older systems. on this paper, a green record hierarchy function-based encryption concept is proposed in cloud computing. The layered get admission to structures are included into a unmarried right wing after which the hierarchical files are encrypted with the incorporated get right of entry to format. The cipher text additives associated with attributes may be shared thru way of the documents. Therefore, each cipher text storage and time charge of encryption is saved. Moreover, the proposed scheme is proved to be cozy under the equal vintage assumption. our experimental simulation indicates the proposed scheme that is quite in phrases of encryption and decryption.

Key-Words / Index Term

Cipher textual content-coverage characteristic-based totally encryption (cp-abe), cloud computing, adequate cloud files encryption

References

[1] agrawal, william bolosky, john douceur, and jacob lorch 5-12 months observe of record-device metadata. in rapid’07, feb. 2007.
[2]anand, sen, krioukov avoiding document machine micromanagement with variety writes. in osdi’08, dec. 2008. ieee transactions on pc systems,quantity:sixty five,issue:6,difficulty date :june.1.2016 14
[3] a. batsakis, r. burns, a. kanevsky, j. lentini, and t. talpey. awol: an adaptive write optimizations layer. in rapid’08, feb. 2008.
[4] p. carns, okay. harms, w. allcock, c. sir francis Francis Bacon, s. lang, r. latham, and r. ross. knowledge and improving computational technological know-how storage get right of access to through non-stop characterization. acm transactions on storage, 7(3):1–26, 2011.
[5] f. chen, t. luo, and x. zhang. caftl: a content material fabric-conscious flash translation layer enhancing the lifespan of flash reminiscence based totally robust kingdom drives. in fast’eleven, pages seventy seven–ninety, feb. 2011.
[6] a. t. clements, i. ahmad, m. vilayannur, and j. li. decentralized deduplication in san cluster record systems. in usenix atc’09, jun. 2009.
[7] l. costa, s. al-kiswany, r. lopes, and m. ripeanu. assessing information deduplication trade-offs from an electricity mind-set. in erss’11, jul. 2011.
[8] a. el-shimi, r. kalach, a. kumar, a. oltean, j. li, and s. sengupta. primary information deduplication - big scale look at and system layout. in usenix atc’12, jun. 2012.