Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/2539
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPurushothama, B.R.-
dc.contributor.authorAmberker, B.B.-
dc.date.accessioned2025-01-07T10:06:27Z-
dc.date.available2025-01-07T10:06:27Z-
dc.date.issued2012-01-
dc.identifier.citation10.1109/COMSNETS.2012.6151367en_US
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/2539-
dc.descriptionNITWen_US
dc.description.abstractCloud Computing poses new security and access control challenges as the users outsource their sensitive data onto cloud storage. The outsourced data should be protected from unauthorized users access including the honest-but-curious cloud servers those hosts the data. In this paper, we propose two access control mechanisms based on (1) Polynomial interpolation technique and (2) Multilinear map. In these schemes, the authorized user need to store only a single key material irrespective of number of data items to which he has authorized access.en_US
dc.language.isoenen_US
dc.publisher2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)en_US
dc.subjectCloud computingen_US
dc.subjectAccess controlen_US
dc.subjectServersen_US
dc.subjectPolynomialsen_US
dc.titleAccess control mechanisms for outsourced data in clouden_US
dc.typeOtheren_US
Appears in Collections:Computer Science & Engineering

Files in This Item:
File Description SizeFormat 
Access_control_mechanisms_for_outsourced_data_in_cloud.pdf112.49 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.