
Cipher-Policy Attribute-Based Encryption on Cloud Computing
Author(s) -
Steffina Muthukumar,
S. Karthik,
Diya D Jain,
Rohit Ravindran
Publication year - 2021
Publication title -
international journal of advanced research in science, communication and technology
Language(s) - English
Resource type - Journals
ISSN - 2581-9429
DOI - 10.48175/ijarsct-1202
Subject(s) - upload , computer science , cloud computing , download , encryption , computer security , access control , block (permutation group theory) , database , world wide web , operating system , geometry , mathematics
Cloud computing has drawn expanding interests from both scholastic and industry in the recent years because of its productiveness and low-cost management. Since it offers different types of assistance in an open organization, it is critical for users to utilize secure information for stockpiling and sharing data to guarantee information classification and data users protection. To safely Protect information, the most broadly utilized technique is encryption. The dual-access control, with regards to cloud-based storage, is a control system over both the data owner and the user who can upload and download files without loss of safety, data[1] and effectiveness. The credulous arrangement is that the user can download the whole database[2]. The framework planned in this paper is when the A user logs in with his credentials and after successful acceptance from the two different administrators, the user will be able to download the file present over the cloud. When a malicious user requests, the administrators can find it because it will generate a null value and they can block the user from downloading the files.