ISSN 2394-5125
 

Research Article 


COMBINING DATA OWNER SIDE AND CLOUD SIDE ACCESS CONTROL FOR ENCRYPTED CLOUD STORAGE

M. Manisha, Vijaya Prakash R, Y. Nagendar.

Abstract
People recommend the great power of cloud computing, however, can certainly not entirely trust
the cloud carriers to multitude privacy-sensitive records, as a result of the absence of user-to-cloud
controllability. To ensure discretion, data owners contract out encrypted information instead of plaintexts. To
discuss the encrypted documents with other customers, Cipher text-Policy Attribute-based Encryption (CPABE)
may be utilized to carry out delicate as well as owner-centric access control. But this does not sufficiently
become safe and secure against various other attacks. Many previous programs carried out certainly not provide
the cloud provider with the ability to validate whether a downloader may break. Consequently, these documents
ought to be readily available to everyone access to cloud storage. A destructive attacker can install thousands of
files to release Economical Denial of Durability attacks, which are going to largely eat the cloud source. The
payer of the cloud company bears the expense. Besides, the cloud provider provides both as the accountant and
the payee of source consumption expense, lacking the clarity to data proprietors. These worries need to be
solved in real-world public cloud storing. Within this paper, we plan an answer to get encrypted cloud storage
spaces coming from EDoS assaults and also offer source consumption accountability. It uses CP-ABE schemes
in a black-box way as well as abide by random gain access to the plan of CP-ABE. Our company present two
methods for different setups followed through performance and also security evaluation.

Key words: cloud computing, cloud provider, protocols.


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by M. Manisha
Articles by Vijaya Prakash R
Articles by Y. Nagendar
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

M. Manisha, Vijaya Prakash R, Y. Nagendar. COMBINING DATA OWNER SIDE AND CLOUD SIDE ACCESS CONTROL FOR ENCRYPTED CLOUD STORAGE. JCR. 2020; 7(19): 2882-2893. doi:10.31838/jcr.07.19.352


Web Style

M. Manisha, Vijaya Prakash R, Y. Nagendar. COMBINING DATA OWNER SIDE AND CLOUD SIDE ACCESS CONTROL FOR ENCRYPTED CLOUD STORAGE. http://www.jcreview.com/?mno=120752 [Access: September 14, 2020]. doi:10.31838/jcr.07.19.352


AMA (American Medical Association) Style

M. Manisha, Vijaya Prakash R, Y. Nagendar. COMBINING DATA OWNER SIDE AND CLOUD SIDE ACCESS CONTROL FOR ENCRYPTED CLOUD STORAGE. JCR. 2020; 7(19): 2882-2893. doi:10.31838/jcr.07.19.352



Vancouver/ICMJE Style

M. Manisha, Vijaya Prakash R, Y. Nagendar. COMBINING DATA OWNER SIDE AND CLOUD SIDE ACCESS CONTROL FOR ENCRYPTED CLOUD STORAGE. JCR. (2020), [cited September 14, 2020]; 7(19): 2882-2893. doi:10.31838/jcr.07.19.352



Harvard Style

M. Manisha, Vijaya Prakash R, Y. Nagendar (2020) COMBINING DATA OWNER SIDE AND CLOUD SIDE ACCESS CONTROL FOR ENCRYPTED CLOUD STORAGE. JCR, 7 (19), 2882-2893. doi:10.31838/jcr.07.19.352



Turabian Style

M. Manisha, Vijaya Prakash R, Y. Nagendar. 2020. COMBINING DATA OWNER SIDE AND CLOUD SIDE ACCESS CONTROL FOR ENCRYPTED CLOUD STORAGE. Journal of Critical Reviews, 7 (19), 2882-2893. doi:10.31838/jcr.07.19.352



Chicago Style

M. Manisha, Vijaya Prakash R, Y. Nagendar. "COMBINING DATA OWNER SIDE AND CLOUD SIDE ACCESS CONTROL FOR ENCRYPTED CLOUD STORAGE." Journal of Critical Reviews 7 (2020), 2882-2893. doi:10.31838/jcr.07.19.352



MLA (The Modern Language Association) Style

M. Manisha, Vijaya Prakash R, Y. Nagendar. "COMBINING DATA OWNER SIDE AND CLOUD SIDE ACCESS CONTROL FOR ENCRYPTED CLOUD STORAGE." Journal of Critical Reviews 7.19 (2020), 2882-2893. Print. doi:10.31838/jcr.07.19.352



APA (American Psychological Association) Style

M. Manisha, Vijaya Prakash R, Y. Nagendar (2020) COMBINING DATA OWNER SIDE AND CLOUD SIDE ACCESS CONTROL FOR ENCRYPTED CLOUD STORAGE. Journal of Critical Reviews, 7 (19), 2882-2893. doi:10.31838/jcr.07.19.352