Vol. 1 Issue 3
Year: 2014
Issue:May-Jul
Title:Privacy Preserving Using Multi Layer Encryption for Delegated Access Control in Public Clouds
Author Name:K.Nethaji Sundar Sukumar and L.V. Reddy
Synopsis:
The two layer encryption is to enforce the fine-grained access control on confidential data hosted in the cloud, based on fine-grained encryption data. Under this scenario, data owners are encrypting the data before uploading them on the cloud and re-encrypting the data whenever users change to an alternate. Here the owner is communicating with clouds and users. The better approach used is to minimize the overhead work at the data owners. So, the authors have proposed an approach by using multi layer encryption, whereas the cloud performs a fine-grained encryption. A challenging issue is how to decompose Access Control Policies (ACPs) such that the multi layer encryption can be performed. In the present context, the authors have used novel optimization algorithm and KeyGen algorithm. Also, an efficient group key management scheme, that supports ACPs to work efficiently, is also used.
Year: 2014
Issue:May-Jul
Title:Privacy Preserving Using Multi Layer Encryption for Delegated Access Control in Public Clouds
Author Name:K.Nethaji Sundar Sukumar and L.V. Reddy
Synopsis:
The two layer encryption is to enforce the fine-grained access control on confidential data hosted in the cloud, based on fine-grained encryption data. Under this scenario, data owners are encrypting the data before uploading them on the cloud and re-encrypting the data whenever users change to an alternate. Here the owner is communicating with clouds and users. The better approach used is to minimize the overhead work at the data owners. So, the authors have proposed an approach by using multi layer encryption, whereas the cloud performs a fine-grained encryption. A challenging issue is how to decompose Access Control Policies (ACPs) such that the multi layer encryption can be performed. In the present context, the authors have used novel optimization algorithm and KeyGen algorithm. Also, an efficient group key management scheme, that supports ACPs to work efficiently, is also used.
No comments:
Post a Comment