
An Effective Data Access Method for Public Cloud Data Storage
Author(s) -
M. Laxmaiah,
Modigari Narendra
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.k1017.09811s219
Subject(s) - encryption , computer science , bottleneck , cloud computing , access control , cloud storage , computer security , key (lock) , plan (archaeology) , control (management) , database , operating system , embedded system , archaeology , artificial intelligence , history
These days attribute-based encryption has been gotten as a promising strategy to give versatile and secure data to oversee the conveyed storage in the cloud registering environment. In the attribute-based encryption plan, the single property pro should execute the customer legitimacy check and mystery key flow, and thusly, its outcomes. Customers may be stuck in the believing that at a stretch get their mystery keys and choose to get the required data from Cloud. So as to maintain a strategic distance from the single-point execution bottleneck, we are proposing multi-master access control plan which will assess the issue such way that it gives increasingly successful access control on cloud data to the clients.