Data Refuge in Unreliable Cloud Using Access Control and Access Moment

Provided by: International forum of researchers Students and Academician
Topic: Security
Format: PDF
In this paper, the authors focus on cloud data storage space defense, having persistently been an significant attribute of quality of service data owner's stores encrypted file in the cloud to ensure security for their data in the cloud computing environment and issues decryption key to only authorized user to access the file from cloud. At the same time as client is invalidated, data owner has to re-encrypt the data so that revoked user cannot access the data again. To perform this operation data owner will issue re-encryption command to cloud so that data in cloud gets re-encrypted.

Find By Topic