G, Ramasubramanian and Noordeen, S. and Kavitha, S. (2023) Secure and Delicate Cloud Storage Network Access Management. In: UNSPECIFIED.
Full text not available from this repository.Abstract
Utilizing a combination of cloud computing and peer-to-peer networking, the P2P data cloud may be created to give very open storage resources at a reduced cost. This can be accomplished by capitalizing on the storage capacity of customers who contribute their own data to the cloud. The P2P computing cloud provides extra data security and access management concerns for data proprietors who store sensitive data for trusted domain sharing since server also severs users often move external to the right-hand realm of data owners. In contrast, there are no access management mechanisms present in the cloud that is based on P2P file sharing. In order to find a solution to this issue, it devises both an attribute-based encryption system for cipher text policy and a proxy encryption strategy. The activation Codes for Pseudonym Certificates (ACPC) information access control strategy for P2P cloud storage is stable, powerful, and fine-grained on the basis of these. In ACPC, user-based access restrictions and the use of the P2P credibility system were both enacted as part of the project's implementation. ACPC assists information owners in delegating complex user retrieval activities to cloud servers rather than assigning these operations to well-known device partners. The protection evaluation demonstrates that ACPC has a high level of security. According to the performance review, ACPC is very competitive in environments that are representative of the real world, and it significantly reduces the amount of overhead computing for information owners, other than cloud storage, during the process of user revocations when compared to other contemporary, revocable ABE programs. © 2023 Elsevier B.V., All rights reserved.
| Item Type: | Conference or Workshop Item (Paper) |
|---|---|
| Subjects: | |
| Divisions: | Arts and Science > School of Arts and Science, Chennai > Computer Science |
| Depositing User: | Unnamed user with email techsupport@mosys.org |
| Last Modified: | 01 Dec 2025 06:06 |
| URI: | https://vmuir.mosys.org/id/eprint/2602 |
Dimensions
Dimensions