UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 12 | Issue 10 | October 2025

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 8 Issue 8
August-2021
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2108685


Registration ID:
556636

Page Number

f646-f650

Share This Article


Jetir RMS

Title

Access Control in Cloud Computing with Key-Policy Attribute Based Encryption

Abstract

Cloud computing is a new computing paradigm that is built on virtualization, parallel and distributed computing, utility computing, and service- oriented architecture. In the last several years, cloud computing has emerged as one of the most influential paradigms in the IT industry.Number of papers has proposed access control of outsourced data in cloud computing, but it seems to be more inflexible to implement complex access control policies.This paper propose a hierarchical attribute-set-based encryption scheme for access control in cloud computing. It extends the cipher text-policy attribute-set-based encryption (CP-ASBE, or ASBE for short) scheme by with a hierarchical structure of system users, so as to achieve scalable, flexible and fine-grained access control. The contribution of the paper is multifold. First, to show how to extend the ASBE algorithm with a hierarchical structure to improve scalability and flexibility while at the same time inherits the feature of fine-grained access control of ASBE. Second, to demonstrate how to implement a full-fledged access control scheme for cloud computing . The scheme provides full support for hierarchical user grant, file creation, file deletion, and user revocation in cloud computing. Third, to formally prove the security of the proposed scheme based on the security of the CP-ABE scheme and analyze its performance in terms of computational overhead.

Key Words

Access Control in Cloud Computing with Key-Policy Attribute Based Encryption

Cite This Article

"Access Control in Cloud Computing with Key-Policy Attribute Based Encryption", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.8, Issue 8, page no.f646-f650, August-2021, Available :http://www.jetir.org/papers/JETIR2108685.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Access Control in Cloud Computing with Key-Policy Attribute Based Encryption", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.8, Issue 8, page no. ppf646-f650, August-2021, Available at : http://www.jetir.org/papers/JETIR2108685.pdf

Publication Details

Published Paper ID: JETIR2108685
Registration ID: 556636
Published In: Volume 8 | Issue 8 | Year August-2021
DOI (Digital Object Identifier):
Page No: f646-f650
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000160

Print This Page

Current Call For Paper

Jetir RMS