1 research outputs found

    Prevention of Sensitive Information by Enhancing Cloud Access Control

    Get PDF
    the scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication, and storage overheads are comparable to centralized approaches. To better protect data security, this paper makes the first attempt to formally address and which are centralized. The communication, computation access control scheme is decentralized and robust; unlike other access control schemes designed for clouds the problem of authorized data. Different from traditional existing systems, the differential privileges of users are further considered in duplicate check besides the data itself by encrypting the file with differential privilege keys. Unauthorized users cannot decrypt the cipher text even collude with the S-CSP. Security analysis of the definitions specified in the demonstrates that our system is secure in terms proposed security model
    corecore