Open Access
Subscription Access
Open Access
Subscription Access
Storage of Data on Cloud with Double Check Admission Regulator
Subscribe/Renew Journal
An admission regulator scheme to cloud services that are based on web is explained here. The proposed method is an admission regulator technique. It is executed having two things such as key from user which is secret and a lightweight device which is secured. This technique will improve security of system. Users cannot have entry to system in the absence of both (secret key and device) things. This method provides security where many users share same access point to use service offered by cloud. This admission regulator technique allows server of cloud to confine the access to users who are having same components. This is to sustain safety. The service provider only recognizes whether user fulfils the ground as per requirement. But it does not have any clue on precise uniqueness of the consumer who uses data on cloud.
Keywords
Admission Regulator, Cloud Services, Lightweight Device, Secret Key.
Subscription
Login to verify subscription
User
Font Size
Information
- J. Lai, R. H. Deng, C. Guan, and J. Weng, “Attribute-based encryption with verifiable outsourced decryption,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1343-1354, August 2013.
- J. Hur, “Improving security and efficiency in attribute-based data sharing,” IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 10, pp. 2271-2282, October 2013.
- M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131-143, January 2013.
- T. Jung, X. Y. Li, Z. Wan, and M. Wen, “Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 190-199, January 2015.
- D. Boneh, X. Ding, and G. Tsudik, “Fine-grained control of security capabilities,” ACM Trans. Internet Technol., vol. 4, no. 1, pp. 60-82, 2004.
Abstract Views: 288
PDF Views: 0