Implementation of Attribute Hiding Strategy and Key Revocation in Cloud Environment

Download Now
Provided by: International Journal of Innovative Science Engineering and Technology (IJISET)
Topic: Security
Format: PDF
Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Cloud computing is comparable to grid computing, a type of computing where unused Processing cycles of all computers in networks are hareness to solve problems too intensive for any stand-alone machine. The author proposes a privacy preserving access, scheme for data storage, which supports anonymous authentication and performs decentralized key management. In the proposed scheme, the cloud adopts an access control policy and attributes hiding strategy to enhance security.
Download Now

Find By Topic