Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Result Evaluation of Optimized (SABM: A Scalable Attribute-based Method) for Effective and Uniform Way to Control in Cloud Computing

Print
PDF
IJCA Proceedings on National Conference on Contemporary Computing
© 2017 by IJCA Journal
NCCC 2016 - Number 1
Year of Publication: 2017
Authors:
Vratika Tiwari
Chetan Chauhan
Anand Rajavat

Vratika Tiwari, Chetan Chauhan and Anand Rajavat. Article: Result Evaluation of Optimized (SABM: A Scalable Attribute-based Method) for Effective and Uniform Way to Control in Cloud Computing. IJCA Proceedings on National Conference on Contemporary Computing NCCC 2016(1):19-24, April 2017. Full text available. BibTeX

@article{key:article,
	author = {Vratika Tiwari and Chetan Chauhan and Anand Rajavat},
	title = {Article: Result Evaluation of Optimized (SABM: A Scalable Attribute-based Method) for Effective and Uniform Way to Control in Cloud Computing},
	journal = {IJCA Proceedings on National Conference on Contemporary Computing},
	year = {2017},
	volume = {NCCC 2016},
	number = {1},
	pages = {19-24},
	month = {April},
	note = {Full text available}
}

Abstract

At present cloud computing is going to be extremely popular innovation in IT undertakings. For an organization, the information put away is immense and it is extremely valuable. All capacities are performed through systems. Therefore, it turns out to be imperative to have the secured utilization of information. In cloud figuring, a definitive essential worries of security are information security and privacy, furthermore adaptable and versatile, fine grained access control must be keep in the cloud frameworks. Attribute based encryption (ABE), takes into account uncommon access control on scrambled information [1]. In its key strategy extricate, the primitive empowers senders to scramble messages under an arrangement of traits and private keys are connected with access structures that determine which figure writings the key holder will be permitted to unscramble . we propose the a scalable attribute-based method (SABM) to build up another security highlight for different authoritative stages. It is actualized utilizing figure content arrangement by scrambling and unscrambling the information in the cloud so that the cloud framework turns out to be more adaptable what's more, adaptable by implementing information proprietors to share their information with information customers controlled by the space power [2].

References

  • Zhiguo Wan, Jun'e Liu, and Robert H. Deng, Senior Member, IEEE, HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Controlling Cloud Computing APRIL 2012.
  • A. Vishnukumar, G. Muruga Boopathi, S. Sabareessh, " Scalable Access Control in Cloud Computing Using Hierarchical Attribute Set Based Encryption (HASBE)," International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319–6378, Volume-1, Issue-4, February 2013.
  • Chandana. V. R, Radhika Govankop,Rashmi N and R. Bharathi, "GASBE: A GRADED ATTRIBUTE-BASED SOLUTION FOR ACCESS CONTROL IN CLOUD COMPUTING," International Conference on Advances in Computer and Electrical Engineering (ICACEE'2012) Nov. 17-18, 2012.
  • R. Martin, "IBM brings cloud computing to earth with massive new data centers," InformationWeek Aug. 2008.
  • K. Barlow and J. Lane, "Like technology from an advanced alien culture: Google apps for education at ASU," in Proc. ACM SIGUCCS User Services Conf. , Orlando, FL, 2007.
  • B. Barbara, "Salesforce. com: Raising the level of networking," Inf. Today, vol. 27, pp. 45–45, 2010.
  • Rakesh Bobba, Himanshu Khurana & Manoj Prabhakaran, "Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption" in University of Illinois at Urbana-Champaign, July 2009.
  • John Bethencourt, Amit Sahai & Brent Waters, "Ciphertext-Policy Attribute-Based Encryption", in NSF CNS-0524252 US Army Research, in 2009.
  • A. Ross, "Technical perspective: A chilly sense of security," Commun. ACM, vol. 52, pp. 90–90, 2009.
  • D. E. Bell and L. J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation. The MITRE Corporation, Tech. Rep. , 2010.
  • T. Yu and M. Winslett, "A unified scheme for resource protection in automated trust negotiation," in Proc. IEEE 2013.
  • A. Sahai and B. Waters, "Fuzzy identity based encryption," in Proc. Acvancesin Cryptology—Eurocrypt, 2005, vol. 3494, LNCS, pp. 457–473.
  • "An Ascendable Aspect Based Method for Effective and Uniform Way to Control in Cloud", International Journal of Engineering Research in Computer Science and Engineering (IJERCSE) Vol 3, Issue 3, March 2016.
  • "An expansible approach to maintain and intensify security in cloud", Proceedings of 27th IRF International Conference, 26th June, 2016, Bengaluru, India, ISBN: 978-93-86083-46-3.