Prevention of EDoS Attack on Cloud Data using Dual Access Control Strategy
Author(s):
SHRUTI ANILRAO JARI, DR.RANJIT R KEOLE, DR.AVINASH P JADHAO, NARESH VINOD WANKHADE
Keywords:
Data Security, Ciphertext, Confidential Data, Cloud Storage, Data Owner, Data Integrity, Authentication, Non-Repudiation, Confidentiality
Abstract
Data owners can distribute protected data utilizing cloud storage of legal person with maintaining accessibility control rules concealed using the Ciphertext-Policy Attribute-Based Encryption approach with a confidential access security strategy. Moreover, a technique to restrict clients from gaining subsequent data and provides the owner's limited amount of data on objects that create a dispute of interest or someone whose pairing is critical is still to be investigated. In this research, examine the fundamental relationships between these specific data items, establish the idea of the confidential documents set restriction, and suggest CP-ABE access control system for the confidential data set restriction with concealed properties. This approach entails a somewhat concealed, extendable restriction strategy. To improve protection, the responsibilities of implementing the access control mechanism and the restriction strategy are split into 2 autonomous units in proposed design, thanks to the clearly defined responsibilities concept. After the scheme has been established, the data holder can substantially update the personal data collection restriction design using the concealed restriction strategy.
Article Details
Unique Paper ID: 160770
Publication Volume & Issue: Volume 10, Issue 1
Page(s): 1185 - 1188
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024