
Aspect of join ingress authority for civic directory
Author(s) -
S. Rajaprakash,
S. Muthuselvan,
C. Bagath Basha,
A. Kesshika,
E. Pavithra
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1706/1/012162
Subject(s) - cloud computing , computer security , computer science , access control , encryption , hacker , directory , key (lock) , cloud computing security , information sensitivity , public key cryptography , data security , operating system
T Nowadays, Cloud computing is a major and emerging platform that provides various IT related services. The two major factors which inhibit the growth of cloud computing are privacy and security. Hackers can break into public or private cloud environment and steal the data. They can use it with malicious intent such as either use or sell the sensitive information obtained from the business cloud environment. Hence, user’s safety depends upon security level in cloud service providers. For an enterprise, there are enormous amount of data is stored and most of them are sensitive information which can affect huge number of people or an entire business organization. Networks are the medium through which all tasks are performed. For access control, being one of the classic research topics, various schemes have been proposed and implemented. In existing key policy, when the key which provides access to the data falls into the wrong hands, they can use it with malicious intent such as steal or alter the data or sell the sensitive information obtained from the business cloud environment. Using our proposed algorithm, we can able to provide a collaborative access control scheme for public cloud storage. This system is implemented using encryption method called Attribute Based Encryption. Encrypting data ensures that even if the data falls into the wrong hands, it is useless as long as its keys remain secure. Even when the hacker gets access to the key, he cannot access the data as only the assigned users can access the data using the key.