Different access control methods with revocationin multi-authority cloud

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Now-a-days, usage of cloud is getting more popular and for the safety the security is being enhanced every day from time to time. Multiple security techniques are being implemented.Attribute based security is one of the concepts especially for basics of the cipher-text based, but the user's attributes were given by the multiple authorities. So, the multi-authority with cipher-text encryption is emerging at present. In this, we will see why the cipher-text based is important and different security models with the multi-authority with the revocation in the different levels in the security models.


  • Keywords


    Multi-Authority; Revocation; Encryption; Attributes.

  • References


      [1] DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems Kan Yang, Associate Member, IEEE, XiaohuaJia,IEEE, Kui Ren, Senior Member, IEEE, Bo Zhang, Member, IEEE, and RuitaoXie, Student Member, IEEE.

      [2] On the Security of Data Access Control for Multiauthority Cloud Storage Systems Xianglong Wu, Rui Jiang, and Bharat Bhargava, Fellow, IEEE.

      [3] Two-Factor Data Access Control with Efficient Revocation for Multi-Authority Cloud Storage Systems Xiaoyu Li, Shaohua Tang, Lingling Xu, Huaqun Wang, and Jie Chen.

      [4] D. Boneh and M. Franklin, ‘‘Identity-based encryption from the Weil pairing,’’ in Proc. CRYPTO.https://doi.org/10.1007/3-540-44647-8_13.


 

View

Download

Article ID: 9713
 
DOI: 10.14419/ijet.v7i1.1.9713




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.