scholarly journals Cipher-Policy Attribute-Based Encryption on Cloud Computing

Author(s):  
Steffina Muthukumar ◽  
S D Karthik ◽  
Diya D Jain ◽  
Rohit Ravindran

Cloud computing has drawn expanding interests from both scholastic and industry in the recent years because of its productiveness and low-cost management. Since it offers different types of assistance in an open organization, it is critical for users to utilize secure information for stockpiling and sharing data to guarantee information classification and data users protection. To safely Protect information, the most broadly utilized technique is encryption. The dual-access control, with regards to cloud-based storage, is a control system over both the data owner and the user who can upload and download files without loss of safety, data[1] and effectiveness. The credulous arrangement is that the user can download the whole database[2]. The framework planned in this paper is when the A user logs in with his credentials and after successful acceptance from the two different administrators, the user will be able to download the file present over the cloud. When a malicious user requests, the administrators can find it because it will generate a null value and they can block the user from downloading the files.

2016 ◽  
Vol 2016 ◽  
pp. 1-10 ◽  
Author(s):  
Zhitao Guan ◽  
Jing Li ◽  
Zijian Zhang ◽  
Liehuang Zhu

VCC (Vehicular Cloud Computing) is an emerging and promising paradigm, due to its significance in traffic management and road safety. However, it is difficult to maintain both data security and system efficiency in Vehicular Cloud, because the traffic and vehicular related data is large and complicated. In this paper, we propose a conditional ciphertext-policy attribute-based encryption (C-CP-ABE) scheme to solve this problem. Comparing with CP-ABE, this scheme enables data owner to add extra access trees and the corresponding conditions. Experimental analysis shows that our system brings a trivial amount of storage overhead and a lower amount of computation compared with CP-ABE.


Cloud acts as a database for huge amount of data. It allows users to store the information or data related items in the cloud storage and allows them to use/ their data via network connection. There are different types of cloud, Public private hybrid and community. In case of public cloud the user rents the storage and stores the data in it. There exist some trust issues in storing data in the cloud since there are many untrusted users who also rented the cloud and there is need for the encryption of data there are many ways to encrypt the data the new trend in encryption is attribute based encryption. The main advantage in attribute based encryption is that it depends on the attributes of the user which differs vastly from one user to another. This paper explains about the use of attribute based encryption in cloud and how it differs from the other encryption algorithms and it advantages over other algorithms. This paper also explains about the cipher-text policy in ABE in various aspects


Electronics ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 171 ◽  
Author(s):  
Aymen Mudheher Badr ◽  
Yi Zhang ◽  
Hafiz Gulfam Ahmad Umar

The increasing use of cloud computing, especially in commercial, government and healthcare institutions, started with the use of computerized clouds. Clouds store important data, which reduces the cost of management and ensures easy access. To protect this data, cryptographic methods are used to ensure confidentiality of the data, as well as to secure access to user data and increase trust in cloud technology. In our paper, we suggest a new scheme to support an attribute-based encryption system (ABE) that involves multiple parties such as data owners, data users, cloud servers and authority. A verified and authenticated decryption process for the cloud environment is the imperative feature of our proposed architecture. The data owner encrypts their data and sends it to the cloud. The cloud server performs partial decryption and the final decrypted data are shared for users as per their privileges. Thus, the data owner reduces complexity of productivity by delegating the decryption process to the cloud server. Analysis of the experimental results confirms that data access in the electronic cloud atmosphere is safer due to a controlled multiple-users-rights scheme. Our performance evaluation results show that the proposed model condensed the communication overhead and made Digital Imaging and Communications in Medicine (DICOM) more secure.


2019 ◽  
Vol 8 (1) ◽  
pp. 44-49
Author(s):  
R. K. Ramesh . ◽  
K. L. Neela .

In the recent years, the cloud computing moves a step forward by providing more services for the individual users and organizations. Each and every technology and systems can be easily integrated with cloud environment. In future lot of new technology will come to play their role. But to make the new technology fulfill their role they surely need a small part of cloud computing. The cloud plays a vital role in managing the data of different users. Users may be individual or organization and they use any cloud deployment model. Cloud provides low cost unpredictable and untraceable storage space to store user’s data. The main aim is to keep the data reliable, available, secure and sharable for the authorized users. But keeping the data secure is a big issue .In a public cloud any one can access the cloud easily. But the CSP or data owner has to prevent the unauthorized user’s access to the cloud. CSP can easily modify or delete the data which are not used by the user for a long time so as to get the storage space .The data integrity problem can be overcome by some different techniques which are proposed in various models .We can surely say that this cloud computing technology will become popular than any other technology.


2020 ◽  
Vol 17 (7) ◽  
pp. 2983-2988
Author(s):  
Gowtham Mamidisetti ◽  
Ramesh Makala

In computing systems, one of the centric topics entails cloud computing. This dominance is attributed to the crucial role that the concept plays in the daily lives of individuals, especially in the wake of the increasing adoption of technology by individuals and organizations. Indeed, the motivation behind the establishment, adoption, and implementation of cloud computing has been attributed to the need to offer low-cost and quick consumer service provision, as well as data manipulation and storage. However, the cloud environment continues to face security threats, a trend that informs the need for further investigations and analyses that could provide room for new system improvements. The current simulation study presents a dynamic model for security management in a cloud computing environment, with the central parameter involving electronic trust. Imperatively the proposed study examines interactions between the data provider and the data owner, as well as the end user. Specifically, the proposed model is that which ensures that for authentication purposes and access permissions, there is a continuous update of trust values. From the results, the model is flexible relative to the provision of dynamic access control, a positive trend that points to its promising level of efficiency.


Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


2020 ◽  
Author(s):  
Devashish Sen ◽  
Rohini Srivastava ◽  
Nitin Sahai ◽  
R. P. Tewari ◽  
Basant Kumar

2021 ◽  
pp. 088391152199784
Author(s):  
Nipun Jain ◽  
Shashi Singh

Development of an artificial tissue by tissue engineering is witnessed to be one of the long lasting clarified solutions for the damaged tissue function restoration. To accomplish this, a scaffold is designed as a cell carrier in which the extracellular matrix (ECM) performs a prominent task of controlling the inoculated cell’s destiny. ECM composition, topography and mechanical properties lead to different types of interactions between cells and ECM components that trigger an assortment of cellular reactions via diverse sensing mechanisms and downstream signaling pathways. The polysaccharides in the form of proteoglycans and glycoproteins yield better outcomes when included in the designed matrices. Glycosaminoglycan (GAG) chains present on proteoglycans show a wide range of operations such as sequestering of critical effector morphogens which encourage proficient nutrient contribution toward the growing stem cells for their development and endurance. In this review we discuss how the glycosylation aspects are of considerable importance in everyday housekeeping functions of a cell especially when placed in a controlled environment under ideal growth conditions. Hydrogels made from these GAG chains have been used extensively as a resorbable material that mimics the natural ECM functions for an efficient control over cell attachment, permeability, viability, proliferation, and differentiation processes. Also the incorporation of non-mammalian polysaccharides can elicit specific receptor responses which authorize the creation of numerous vigorous frameworks while prolonging the low cost and immunogenicity of the substance.


Sign in / Sign up

Export Citation Format

Share Document