z-logo
open-access-imgOpen Access
An Effective Data Access Method for Public Cloud Data Storage
Author(s) -
M. Laxmaiah,
Modigari Narendra
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.k1017.09811s219
Subject(s) - encryption , computer science , bottleneck , cloud computing , access control , cloud storage , computer security , key (lock) , plan (archaeology) , control (management) , database , operating system , embedded system , archaeology , artificial intelligence , history
These days attribute-based encryption has been gotten as a promising strategy to give versatile and secure data to oversee the conveyed storage in the cloud registering environment. In the attribute-based encryption plan, the single property pro should execute the customer legitimacy check and mystery key flow, and thusly, its outcomes. Customers may be stuck in the believing that at a stretch get their mystery keys and choose to get the required data from Cloud. So as to maintain a strategic distance from the single-point execution bottleneck, we are proposing multi-master access control plan which will assess the issue such way that it gives increasingly successful access control on cloud data to the clients.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here