tailieunhanh - A secure data access control for active groups in cloud data storage
In this paper, we have presented a secure group data access control paradigm driven by Diffe Hellman ciphering exchanges. An interesting extension to this work is the implementation of a time driven self destructing cloud group data sharing model that is a sender friendly approach that can deal with the problem of revocation in an automated approach. | ISSN:2249-5789 K Haneesha et al, International Journal of Computer Science & Communication Networks,Vol 7(5),138-141 A Secure Data Access Control for Active Groups in Cloud Data Storage K. Haneesha M. Tech, Department of CSE, Shri Vishnu Engineering College for Women (A), Vishnupur, Bhimavaram, West Godavari District, Andhra Pradesh. Dr. P. S. V. Srinivasa Rao Professor, Department of CSE Shri Vishnu Engineering College for Women (A), Vishnupur, Bhimavaram, West Godavari District, Andhra Pradesh. Abstract Cloud will be used to empower few destructing cloud group data sharing model that services like data distribution, storage service, is a sender friendly approach that can deal with Trustworthy service etc. The main aim of this the problem of revocation in an automated article is Trustworthy with secure data sharing. approach. So we propose to extend the prior The benefits of current paper can gain from data system using a dynamic time bound framework sharing is higher productivity. With multiple group from different organization contributing to automate the task of revocation without involving any additional complexities. to content in the cloud. Privacy between the Introduction group members and service provider not supported and the private key won’t disclosed In conveyed figuring, Service provider once the personal permanent portable secret is offer data storing for User to have data. It will once obtained by intruder. Conflicts between empower customer to reduce their saving of data group members key revocation. organizations Easily suffer by migrating the area data from intruder, for example group members organizations into cloud. Regardless, security is conflict. This attack will lead to disclosing noteworthy concern transform into the principal private data files. In this paper, we have constraint as we now outsource the limit of data, presented a secure group data access control which is maybe data delicate, to cloud .
đang nạp các trang xem trước