Abstract:
Security of outsourced data is the primary concern in the cloud computing environment. Cloud can be made more credible and admissible by effective implementation of acces...Show MoreMetadata
Abstract:
Security of outsourced data is the primary concern in the cloud computing environment. Cloud can be made more credible and admissible by effective implementation of access control, confidentiality, integrity, and data recovery. In this paper, first discussed practical cryptographic approaches, and then analyze Cipher Text Attribute Based Encryption (CPABE) under security challenges, access control, revocation, and application. Also, proposed a framework with implementation, which is based on multiple attributes authorities to ensure the safety and privacy of data. Here CPABE, Advanced Encryption Standard (AES), proxy server, Proof of Reliability (POR) and Third Party Auditor (TPA) are jointly used to attain access control, confidentiality, reduced user's overhead, data backup, and integrity checks respectively.
Published in: 2019 International Conference on Electrical, Electronics and Computer Engineering (UPCON)
Date of Conference: 08-10 November 2019
Date Added to IEEE Xplore: 06 February 2020
ISBN Information: