DocumentCode :
3688446
Title :
Magnified cloud security through access control
Author :
K. Ganagavalli;P. Saravanan;V. Krishnamoorthy
Author_Institution :
Department of Information Technology, KGiSL Institute of Technology, Coimbatore
fYear :
2015
Firstpage :
1
Lastpage :
4
Abstract :
In the upcoming computer world cloud computing has been becoming an emerging technology for sharing resources and outsourcing of data. While storing the data in cloud, the data owners need not to run and keep their data in their personal devices. Instead, the data will be maintained by the cloud servers which are maintained by a third party. From users´ point of view, putting sensitive data on the cloud and losing control of these data may increase the risk of being abused. Access control is a mechanism that is used for preventing unauthorized access of the resource. This service provides controls over the data such that who can access to a resource, under what conditions their access can occur, and also restricts the actions performed by a person on the resources. To achieve this, an identity-based proxy re-encryption scheme has been adopted which allows a user to encrypt his data under his identity and to delegate his data management capability to the cloud. The cloud, which could grant the access to an authorized user by transforming the cipher text encrypted with the data owner´s identity to the one with the sharer´s identity. This algorithm achieves more security than the existing algorithms in data management and also restricting the resource access control.
Keywords :
"Cloud computing","Access control","Encryption","Servers","Ciphers"
Publisher :
ieee
Conference_Titel :
Advanced Computing and Communication Systems, 2015 International Conference on
Type :
conf
DOI :
10.1109/ICACCS.2015.7324136
Filename :
7324136
Link To Document :
بازگشت