Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Adaptive Content based Secured Access of Data in Cloud Environment


     

   Subscribe/Renew Journal


Cloud computing has great potential of providing robust computational power to the society at reduced cost. It enables customer with limited computational resources to outsource their large computation workloads to the cloud. Outsourced computation contains sensitive information such as business, financial records, health records, etc., sensitive data have to be encrypted before outsourcing so as to provide data confidentiality. The study leads to the existence of another problem , when an unauthorized user search for data that are encrypted completely , the data that was retrieved to the user irrelevant, Which makes the cloud inefficient in providing data to the users. The proposed technique separates the sensitive data and non sensitive data, where sensitive data is alone encrypted by the session key, which enables better efficiency in providing non sensitive data to unauthorized users of cloud. The scheduler identifies the authenticated /unauthenticated and authorized unauthorized user based on their priority using ACL (Access control list) and delivers the session key. This technique reduces the computational time &resource and allows faster, reliable and efficient data access to all kinds of user.


Keywords

Cloud Computing, Encrypting/Decrypting, Linear Algebraic Computations.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 160

PDF Views: 1




  • Adaptive Content based Secured Access of Data in Cloud Environment

Abstract Views: 160  |  PDF Views: 1

Authors

Abstract


Cloud computing has great potential of providing robust computational power to the society at reduced cost. It enables customer with limited computational resources to outsource their large computation workloads to the cloud. Outsourced computation contains sensitive information such as business, financial records, health records, etc., sensitive data have to be encrypted before outsourcing so as to provide data confidentiality. The study leads to the existence of another problem , when an unauthorized user search for data that are encrypted completely , the data that was retrieved to the user irrelevant, Which makes the cloud inefficient in providing data to the users. The proposed technique separates the sensitive data and non sensitive data, where sensitive data is alone encrypted by the session key, which enables better efficiency in providing non sensitive data to unauthorized users of cloud. The scheduler identifies the authenticated /unauthenticated and authorized unauthorized user based on their priority using ACL (Access control list) and delivers the session key. This technique reduces the computational time &resource and allows faster, reliable and efficient data access to all kinds of user.


Keywords


Cloud Computing, Encrypting/Decrypting, Linear Algebraic Computations.