Self-Destructing Scheme in Cloud Computing for Data Security
Pages : 37-39
Download PDF
Abstract
Cloud computing have been playing very vital role in the rapidly growing organizations. It becomes mostly susceptible to use cloud services to share data between organizations, electronic businesses and a friend circle in the cloud computing environment. Because of the fastest development in electronic business by using the various cloud services, it is very difficult to provide full lifecycle privacy security and access control becomes a very tedious task, specifically when sharing the sensitive data on cloud servers for achieving the anytime, anywhere service for authentic person or organization. Also for sharing purpose we need efficient method and secure technique over cloud services. In order to grab this problem the key-policy attribute-based encryption with time-specified attributes KP-TSABE, which is focus on data security over specific time period and proposed new proxy re-encryption technique for providing full lifecycle privacy security solution(Jinbo Xiong et al, 2014). We predict that fast and secure re-encryption will become increasingly popular as a method for managing encrypted file systems in which new re-encryption schemes that realize a stronger notion of security.
Keywords: Sensitive Data, Cloud Computing, privacy-preserving, fine-grained access control
Article published in International Journal of Current Engineering and Technology, Vol.6, No.1 (Feb-2016)