• E-ISSN:

    2454-9584

    P-ISSN

    2454-8111

    Impact Factor 2020

    5.051

    Impact Factor 2021

    5.610

  • E-ISSN:

    2454-9584

    P-ISSN

    2454-8111

    Impact Factor 2020

    5.051

    Impact Factor 2021

    5.610

  • E-ISSN:

    2454-9584

    P-ISSN

    2454-8111

    Impact Factor 2020

    5.051

    Impact Factor 2021

    5.610

INTERNATIONAL JOURNAL OF INVENTIONS IN ENGINEERING & SCIENCE TECHNOLOGY

International Peer Reviewed (Refereed), Open Access Research Journal
(By Aryavart International University, India)

Paper Details

Key-Access Security Scheme in Cloud Computing

Yashika Gupta

Apeejay School, Pitampura, New Delhi, India

7 - 10 Vol. 8, Jan-Dec, 2022
Receiving Date: 2022-11-28;    Acceptance Date: 2022-01-04;    Publication Date: 2022-01-12
Download PDF

Abstract

In this work, we utilize key access control the board plot that quickly changes any association-like security strategy to best-class cloud-level security. Offering an entirely adaptable, secure, and various levelled key access component for foundations that arrange with strategic information. The plan likewise limits worries about moving basic information to the general population cloud and guarantees just the clients with adequate authorization from equivalent, or higher exceptional individuals can get to the key by utilizing the topological requesting of a coordinated chart that incorporates self-circle. The central overheads like public and private storage needs are restricted to an excellent level, and the assurance of the key is computationally speedy and capable. According to a security point of view, the proposed plan would oppose joint effort attacks and give essential lack of definition security. Since the key isn't put away anyplace along these lines, the issue of an information break is eliminated

    References

  1. L. Zhou, V. Varadharajan, and M. Hitchens, ‘‘Achieving secure role-based access control on encrypted data in cloud storage,’’ IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1947–1960, Dec. 2013
  2. L. Zhou, V. Varadharajan, and M. Hitchens, ‘‘Trust enhanced cryptographic role-based access control for secure cloud data storage,’’ IEEE Trans. Inf. Forensics Security, vol. 10, no. 11, pp. 2381– 2395, Nov. 2015
  3. W.-G. Tzeng, ‘‘A time-bound cryptographic key assignment scheme for access control in a hierarchy,’’ IEEE Trans. Knowl. Data Eng., vol. 14, no. 1, pp. 182– 188, Aug. 2002.
  4. H. M. Sun, K. H. Wang, and C. M. Chen, ‘‘On the security of an efficient time-bound hierarchical key management scheme,’’ IEEE Trans. Dependable Secure Comput., vol. 6, no. 2, pp. 159– 160, Apr. 2009
  5. S. Tang, X. Li, X. Huang, Y. Xiang, and L. Xu, ‘‘Achieving simple, secure and efficient hierarchical access control in cloud computing,’’ IEEE Trans.
  6. A. K. Das, N. R. Paul, and L. Tripathy, ‘‘Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem,’’ Inf. Sci., vol. 209, pp. 80–92, Nov. 2012.
  7. Y.-L. Lin and C.-L. Hsu, ‘‘Secure key management scheme for dynamic hierarchical access control based on ECC,’’ J. Syst. Softw., vol. 84, no. 4, pp. 679–685, 2011.
  8. A. De Santis, A. L. Ferrara, and B. Masucci, ‘‘Efficient provably-secure hierarchical key assignment schemes,’’ Theor. Comp
  9. H. Min-Shiang, ‘‘A cryptographic key assignment scheme in a hierarchy for access control,’’ Math. Comput. Model., vol. 26, no. 2, pp. 27–31, Jul. 1997.
  10. P. D’Arco, A. De Santis, A. L. Ferrara, and B. Masucci, ‘‘Variations on a theme by Akl and Taylor: Security and tradeoffs,’’ Theor. Comput. Sci., vol. 411, no. 1, pp. 213–227, 2010.
  11. M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, ‘‘Dynamic and efficient key management for access hierarchies,’’ ACM Trans.
  12. V. R. L. Shen and T.-S. Chen, ‘‘A novel key management scheme based on discrete logarithms and polynomial interpolations,’’
  13. E. S. V. Freire, K. G. Paterson, and B. Poettering, ‘‘Simple, efficient and strongly KIsecure hierarchical key assignment schemes,’’ in Topics in Cryptology— CT-RSA (Lecture Notes in Computer Science), vol. 7779, E. Dawson, Ed. Berlin, Germany: Springer, 2013.
Back

alexistogel toto online

bandar alexistogel

alexistogel bandar gacor

alexistogel link

alexistogel online

alexistogel bandar togel

link alternatif alexistogel

alexistogel

alexistogel

alexistogel

alexistogel daftar

alexistogel toto macau

alexistogel bandar macau

alexistogel slot

alexistogel agen slot

alexistogel

situs alexistogel

alexistogel

alexistogel slot

alexistogel

alexistogel

alexistogel

alexistogel bandar slot

alexistogel

Alexistogel Toto Macau

alexistogel

bandar alexistogel

alexistogel slot

alexistogel link alternatif

alexistogel macau

alexistogel

alexistogel toto macau

slot alexistogel

alexistogel bandar togel

alexistogel

alexistogel rtp

alexistogel

alexistogel slot

alexistogel

alexistogel

alexistogel

alexistogel terpercaya

daftar alexistogel

alexistogel online

rtp alexistogel

alexistogel slot

alexistogel gacor

link alternatif alexistogel

alexistogel login

alexistogel

alexistogel slot dana

agen togel online

bandar togel online

alexistogel rtp

alexistogel slot

alexistogel daftar

alexistogel daftar

slot online dana

bandar togel slot

togel online terpercaya

slot pragmatic gacor

link situs slot resmi

situs slot online

link daftar togel slot

bandar slot gacor hari ini

bocoran pola slot

situs slot online

bandar slot online

bandar togel online

slot online terpercaya

togel slot online

slot deposit qris

agen slot online gacor

rtp live slot online

bandar slot online

bandar slot online gacor

agen slot online

daftar bandar togel slot

bandar togel online

togel slot hari ini

link alternatif togel slot

rtp slot online gacor

slot online gacor

situs slot gacor

rtp slot gacor

slot online gacor

tips slot maxwin

togel slot gacor

prediksi togel

game slot gacor

trik slot online

prediksi togel jitu

game slot online

togel online terpercaya

daftar togel slot online

bandar togel terpercaya

slot online gacor

trik slot bonus

prediksi togel online

rtp slot online

panduan togel online

RTP LIVE

Bandar Toto Macau

Situs Slot Gacor

bandarbola855 resmi

bandarbola855 gacor

bandarbola855 slot

link bandarbola855

bandarbola855 bola slot

bandarbola855 rtp

bandarbola855 slot online

bandarbola855 link

bandarbola855 bandar

bandarbola855 slot terpercaya

bandarbola855

bandarbola855 slot

bandarbola855 terpercaya

bandarbola855 online

slot bandarbola855

bandarbola855 slot

bandarbola855 daftar

bandarbola855 link

bandarbola855

bandarbola855

bandarbola855

bandarbola855 slot

bandarbola855

bandarbola855 rtp

bandarbola855

bandarbola855

bandarbola855

iosbet

iosbet

link iosbet

slot online iosbet

iosbet link login

slot iosbet

iosbet gacor

iosbet slot

iosbet

slot iosbet

agen iosbet

bandar iosbet

iosbet

iosbet link

bandar iosbet gacor

iosbet

iosbet

iosbet

iosbet

liatogel

bandar liatogel

login liatogel

live draw hk liatogel

liatogel slot online gacor

liatogel totomacau

liatogel link

slot gacor

daftar slot online

bandar slot dana

slot ovo

slot gopay