Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/2539
Title: Access control mechanisms for outsourced data in cloud
Authors: Purushothama, B.R.
Amberker, B.B.
Keywords: Cloud computing
Access control
Servers
Polynomials
Issue Date: Jan-2012
Publisher: 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)
Citation: 10.1109/COMSNETS.2012.6151367
Abstract: Cloud Computing poses new security and access control challenges as the users outsource their sensitive data onto cloud storage. The outsourced data should be protected from unauthorized users access including the honest-but-curious cloud servers those hosts the data. In this paper, we propose two access control mechanisms based on (1) Polynomial interpolation technique and (2) Multilinear map. In these schemes, the authorized user need to store only a single key material irrespective of number of data items to which he has authorized access.
Description: NITW
URI: http://localhost:8080/xmlui/handle/123456789/2539
Appears in Collections:Computer Science & Engineering

Files in This Item:
File Description SizeFormat 
Access_control_mechanisms_for_outsourced_data_in_cloud.pdf112.49 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.