CFP last date
20 December 2024
Reseach Article

Result Evaluation of Optimized (SABM: A Scalable Attribute-based Method) for Effective and Uniform Way to Control in Cloud Computing

Published on April 2017 by Vratika Tiwari, Chetan Chauhan, Anand Rajavat
National Conference on Contemporary Computing
Foundation of Computer Science USA
NCCC2016 - Number 1
April 2017
Authors: Vratika Tiwari, Chetan Chauhan, Anand Rajavat
623be3f7-3868-4187-b434-84415ab50b7f

Vratika Tiwari, Chetan Chauhan, Anand Rajavat . Result Evaluation of Optimized (SABM: A Scalable Attribute-based Method) for Effective and Uniform Way to Control in Cloud Computing. National Conference on Contemporary Computing. NCCC2016, 1 (April 2017), 19-24.

@article{
author = { Vratika Tiwari, Chetan Chauhan, Anand Rajavat },
title = { Result Evaluation of Optimized (SABM: A Scalable Attribute-based Method) for Effective and Uniform Way to Control in Cloud Computing },
journal = { National Conference on Contemporary Computing },
issue_date = { April 2017 },
volume = { NCCC2016 },
number = { 1 },
month = { April },
year = { 2017 },
issn = 0975-8887,
pages = { 19-24 },
numpages = 6,
url = { /proceedings/nccc2016/number1/27336-6311/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Contemporary Computing
%A Vratika Tiwari
%A Chetan Chauhan
%A Anand Rajavat
%T Result Evaluation of Optimized (SABM: A Scalable Attribute-based Method) for Effective and Uniform Way to Control in Cloud Computing
%J National Conference on Contemporary Computing
%@ 0975-8887
%V NCCC2016
%N 1
%P 19-24
%D 2017
%I International Journal of Computer Applications
Abstract

At present cloud computing is going to be extremely popular innovation in IT undertakings. For an organization, the information put away is immense and it is extremely valuable. All capacities are performed through systems. Therefore, it turns out to be imperative to have the secured utilization of information. In cloud figuring, a definitive essential worries of security are information security and privacy, furthermore adaptable and versatile, fine grained access control must be keep in the cloud frameworks. Attribute based encryption (ABE), takes into account uncommon access control on scrambled information [1]. In its key strategy extricate, the primitive empowers senders to scramble messages under an arrangement of traits and private keys are connected with access structures that determine which figure writings the key holder will be permitted to unscramble . we propose the a scalable attribute-based method (SABM) to build up another security highlight for different authoritative stages. It is actualized utilizing figure content arrangement by scrambling and unscrambling the information in the cloud so that the cloud framework turns out to be more adaptable what's more, adaptable by implementing information proprietors to share their information with information customers controlled by the space power [2].

References
  1. Zhiguo Wan, Jun'e Liu, and Robert H. Deng, Senior Member, IEEE, HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Controlling Cloud Computing APRIL 2012.
  2. A. Vishnukumar, G. Muruga Boopathi, S. Sabareessh, " Scalable Access Control in Cloud Computing Using Hierarchical Attribute Set Based Encryption (HASBE)," International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319–6378, Volume-1, Issue-4, February 2013.
  3. Chandana. V. R, Radhika Govankop,Rashmi N and R. Bharathi, "GASBE: A GRADED ATTRIBUTE-BASED SOLUTION FOR ACCESS CONTROL IN CLOUD COMPUTING," International Conference on Advances in Computer and Electrical Engineering (ICACEE'2012) Nov. 17-18, 2012.
  4. R. Martin, "IBM brings cloud computing to earth with massive new data centers," InformationWeek Aug. 2008.
  5. K. Barlow and J. Lane, "Like technology from an advanced alien culture: Google apps for education at ASU," in Proc. ACM SIGUCCS User Services Conf. , Orlando, FL, 2007.
  6. B. Barbara, "Salesforce. com: Raising the level of networking," Inf. Today, vol. 27, pp. 45–45, 2010.
  7. Rakesh Bobba, Himanshu Khurana & Manoj Prabhakaran, "Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption" in University of Illinois at Urbana-Champaign, July 2009.
  8. John Bethencourt, Amit Sahai & Brent Waters, "Ciphertext-Policy Attribute-Based Encryption", in NSF CNS-0524252 US Army Research, in 2009.
  9. A. Ross, "Technical perspective: A chilly sense of security," Commun. ACM, vol. 52, pp. 90–90, 2009.
  10. D. E. Bell and L. J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation. The MITRE Corporation, Tech. Rep. , 2010.
  11. T. Yu and M. Winslett, "A unified scheme for resource protection in automated trust negotiation," in Proc. IEEE 2013.
  12. A. Sahai and B. Waters, "Fuzzy identity based encryption," in Proc. Acvancesin Cryptology—Eurocrypt, 2005, vol. 3494, LNCS, pp. 457–473.
  13. "An Ascendable Aspect Based Method for Effective and Uniform Way to Control in Cloud", International Journal of Engineering Research in Computer Science and Engineering (IJERCSE) Vol 3, Issue 3, March 2016.
  14. "An expansible approach to maintain and intensify security in cloud", Proceedings of 27th IRF International Conference, 26th June, 2016, Bengaluru, India, ISBN: 978-93-86083-46-3.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Fine Grained Resource Utilization.