International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Reviewer Referral Program
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 6 Issue 6
November-December 2024
Indexing Partners
Attribute Based Encryption Techniques of Cloud Computing Access Control
Author(s) | Deepali Madan Adhav, Mallikarjun M. Math |
---|---|
Country | India |
Abstract | Cloud computing has emerged as a transformative development in the realm of Information Technology. The advent of services like "on-demand" and "pay-as-you-go" has led to the migration of both government and industrial IT infrastructures up in the clouds. With data and business logic being stored on remote cloud servers, the security concerns connecting to the cloud environment differ from those of traditional computing. In the domain inside cloud computing, data security is administered by Cloud Service Providers (CSPs), leaving owner of the data with limited control over the security policies governing their own data. Privacy and saftey stand out as two critical factors that discourage users from transitioning to untrusted cloud environments. Despite the substantial savings in costs associated with cloud adoption, ensuring secured data sharing consistently remains a top priority for data owners. As a result, these two aspects demand heightened attention to facilitate securely sharing data within the cloud computing landscape. This paper undertakes a comprehensive review and comparison of various attribute-based encryption schemes within the context of cloud computing. |
Keywords | Access control, Attribute-based encryption, Cloud computing, CP-ABE, CP-ASBE, HASBE, KP-ABE. |
Field | Computer > Data / Information |
Published In | Volume 6, Issue 2, March-April 2024 |
Published On | 2024-03-08 |
Cite This | Attribute Based Encryption Techniques of Cloud Computing Access Control - Deepali Madan Adhav, Mallikarjun M. Math - IJFMR Volume 6, Issue 2, March-April 2024. DOI 10.36948/ijfmr.2024.v06i02.5839 |
DOI | https://doi.org/10.36948/ijfmr.2024.v06i02.5839 |
Short DOI | https://doi.org/gtmbmq |
Share this
E-ISSN 2582-2160
doi
CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.