Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Storage of Data on Cloud with Double Check Admission Regulator


Affiliations
1 Computer Science and Engineering, Bangalore Institute of Technology, Bengaluru, Karnataka, India
     

   Subscribe/Renew Journal


An admission regulator scheme to cloud services that are based on web is explained here. The proposed method is an admission regulator technique. It is executed having two things such as key from user which is secret and a lightweight device which is secured. This technique will improve security of system. Users cannot have entry to system in the absence of both (secret key and device) things. This method provides security where many users share same access point to use service offered by cloud. This admission regulator technique allows server of cloud to confine the access to users who are having same components. This is to sustain safety. The service provider only recognizes whether user fulfils the ground as per requirement. But it does not have any clue on precise uniqueness of the consumer who uses data on cloud.

Keywords

Admission Regulator, Cloud Services, Lightweight Device, Secret Key.
Subscription Login to verify subscription
User
Notifications
Font Size


  • J. Lai, R. H. Deng, C. Guan, and J. Weng, “Attribute-based encryption with verifiable outsourced decryption,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1343-1354, August 2013.
  • J. Hur, “Improving security and efficiency in attribute-based data sharing,” IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 10, pp. 2271-2282, October 2013.
  • M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131-143, January 2013.
  • T. Jung, X. Y. Li, Z. Wan, and M. Wen, “Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 190-199, January 2015.
  • D. Boneh, X. Ding, and G. Tsudik, “Fine-grained control of security capabilities,” ACM Trans. Internet Technol., vol. 4, no. 1, pp. 60-82, 2004.

Abstract Views: 301

PDF Views: 0




  • Storage of Data on Cloud with Double Check Admission Regulator

Abstract Views: 301  |  PDF Views: 0

Authors

P. Shanthi Kumari
Computer Science and Engineering, Bangalore Institute of Technology, Bengaluru, Karnataka, India

Abstract


An admission regulator scheme to cloud services that are based on web is explained here. The proposed method is an admission regulator technique. It is executed having two things such as key from user which is secret and a lightweight device which is secured. This technique will improve security of system. Users cannot have entry to system in the absence of both (secret key and device) things. This method provides security where many users share same access point to use service offered by cloud. This admission regulator technique allows server of cloud to confine the access to users who are having same components. This is to sustain safety. The service provider only recognizes whether user fulfils the ground as per requirement. But it does not have any clue on precise uniqueness of the consumer who uses data on cloud.

Keywords


Admission Regulator, Cloud Services, Lightweight Device, Secret Key.

References