

A concentrate on Time Touchy Information Access Control
Abstract
To appropriately safeguard put away confidential information, the gadget owner will trade private information with a picked not many and issue decipherment keys to them. Assuming the client has stopped, the cloud will be allowed to remunerate them in re-scrambling the subtleties and will try and plan new decipherment keys for current clients so they will get the data. Since a coursed enlisting climate is influencing all the different cloud servers, indistinguishable charges can't be got, and passing by a few of the cloud servers in light of contending system exchanges. The proposed approach would require realizing, that will be re-mixed, at different segments of time. The assurance is delivered on high present day cryptography premise, major areas of strength for with accentuation, so that fine-grained information gets to each business, and they don't need to get extreme coordination for accuracy.
References
Wan, Z., & Deng, R. H. (2011).
HASBE: A hierarchical attribute- based solution for flexible and scalable access control in cloud computing. IEEE transactions on information forensics and security, 7(2), 743-754.
Yang K., Jia X., Ren X., Zhang B., Xie, R.(2013). DACMACS: Effective data access control for multi-authority cloud storage systems. Transactions on Information Forensics and Security,8(2),1790–1801.
Bertino, E., Bonatti, P. A., & Ferrari,
E. (2001). TRBAC: A temporal role- based access control model. ACM Transactions on Information and System Security (TISSEC), 4(3), 191- 233..
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2012). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), 131-143.
Zhou, Z., Zhang, H., Zhang, Q., Xu, Y., & Li, P. (2014, December). Privacy-preserving granular data retrieval indexes for outsourced cloud data. In 2014 IEEE Global Communications Conference (pp. 601-606). IEEE.
Liu, Q., Tan, C. C., Wu, J., & Wang,
G. (2011, December). Reliable re- encryption in unreliable clouds. In 2011 IEEE Global Telecommunications Conference- GLOBECOM 2011 (pp. 1-5). IEEE.
Bethencourt, J., Sahai, A., & Waters,
B. (2007, May). Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP'07) (pp. 321-334). IEEE.
Boneh, D., & Franklin, M. (2001, August). Identity-based encryption from the Weil pairing. In Annual international cryptology conference (pp. 213-229). Springer, Berlin, Heidelberg.
Yuan, K., Liu, Z., Jia, C., Yang, J., & Lv, S. (2013, September). Public key timed-release searchable encryption. In 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (pp. 241- 248). IEEE.
Liu, Q., Wang, G., & Wu, J. (2014).
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Information sciences, 258, 355-370.
Refbacks
- There are currently no refbacks.