About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
cs 17(10): e4

Research Article

Extensible and fine-grained characteristics-positioned information storage in cloud computing

Download1235 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.20-12-2017.154376,
        author={M. IYAPPARAJA and C. NAVANEETHAN and S. MEENATCHI},
        title={Extensible and fine-grained characteristics-positioned information storage in cloud computing},
        journal={EAI Endorsed Transactions on Cloud Systems},
        volume={3},
        number={10},
        publisher={EAI},
        journal_a={CS},
        year={2017},
        month={12},
        keywords={Distributed computing, cipher-text attribute-based encryption, Data owner, cloud server},
        doi={10.4108/eai.20-12-2017.154376}
    }
    
  • M. IYAPPARAJA
    C. NAVANEETHAN
    S. MEENATCHI
    Year: 2017
    Extensible and fine-grained characteristics-positioned information storage in cloud computing
    CS
    EAI
    DOI: 10.4108/eai.20-12-2017.154376
M. IYAPPARAJA1,*, C. NAVANEETHAN1, S. MEENATCHI1
  • 1: SITE School, VIT, Vellore, TamilNadu-632014
*Contact email: iyapparaja.m@vit.ac.in

Abstract

With the improvement of distributed computing, outsourcing information to cloud server pulls in loads of considerations. To ensure the security and accomplish adaptable fine-grained record access control, (ABE) was proposed and utilized as a part of distributed storage framework. Be that as it may, client repudiation is the essential issue in ABE plans. In this article, we give a cipher text-arrangement trait-based encryption (CP-ABE) plan with effective client repudiation for distributed storage framework. The issue of client repudiation can be explained productively by presenting the idea of client gathering. At the point when any client leaves, the gathering supervisor will redesign client’s PK with the exception of the individuals, who have been declined. Also, CP-ABE plan has substantial calculation cost, as it becomes straightly with the intricacy for the entrance structure. To diminish the calculation cost, we outsource high calculation burden to cloud administration suppliers without spilling document substance and mystery keys. Notably, our plan can withstand conspiracy assault performed by denied clients collaborating with existing clients.

Keywords
Distributed computing, cipher-text attribute-based encryption, Data owner, cloud server
Received
2017-10-15
Accepted
2017-11-21
Published
2017-12-20
Publisher
EAI
http://dx.doi.org/10.4108/eai.20-12-2017.154376

Copyright © 2018 M. IYAPPARAJA et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL