Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/2539
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Purushothama, B.R. | - |
dc.contributor.author | Amberker, B.B. | - |
dc.date.accessioned | 2025-01-07T10:06:27Z | - |
dc.date.available | 2025-01-07T10:06:27Z | - |
dc.date.issued | 2012-01 | - |
dc.identifier.citation | 10.1109/COMSNETS.2012.6151367 | en_US |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/2539 | - |
dc.description | NITW | en_US |
dc.description.abstract | Cloud Computing poses new security and access control challenges as the users outsource their sensitive data onto cloud storage. The outsourced data should be protected from unauthorized users access including the honest-but-curious cloud servers those hosts the data. In this paper, we propose two access control mechanisms based on (1) Polynomial interpolation technique and (2) Multilinear map. In these schemes, the authorized user need to store only a single key material irrespective of number of data items to which he has authorized access. | en_US |
dc.language.iso | en | en_US |
dc.publisher | 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012) | en_US |
dc.subject | Cloud computing | en_US |
dc.subject | Access control | en_US |
dc.subject | Servers | en_US |
dc.subject | Polynomials | en_US |
dc.title | Access control mechanisms for outsourced data in cloud | en_US |
dc.type | Other | en_US |
Appears in Collections: | Computer Science & Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Access_control_mechanisms_for_outsourced_data_in_cloud.pdf | 112.49 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.