Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{143938,
author = {R Uday Kumar and Mrs.M.Sruthi and Dr.I.Satyanarayana},
title = {An approach for Multi-Authority Cloud Computing Storage System},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {3},
number = {4},
pages = {93-96},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=143938},
abstract = {Cloud storage is a vital service of cloud computing, that provides services for data proprietors for hosting their data within the cloud. This new paradigm of information hosting and knowledge access services introduces an excellent challenge to data access control. Cipher text-Policy Attribute-based File encryption (Club penguin-ABE) is considered among the most appropriate technologies for data access control in cloud storage, since it gives data proprietors more direct control on access guidelines. However, it is not easy to directly apply existing Club penguin-ABE schemes to data access control for cloud storage systems due to the attribute revocation problem. Data access control is an efficient way to guarantee the data peace of mind in the cloud. Because of data outsourcing and untrusted cloud servers, the information access control turns into a challenging issue in cloud storage systems. Within this paper, we design a significant, efficient and revocable data access control plan for multi-authority cloud storage systems, where you can find multiple government bodies co-exist and every authority has the capacity to issue characteristics individually. Case study and simulation results reveal that our suggested data access control plan is safe within the random oracle model and it is more effective than previous works. Particularly, we advise a revocable multi-authority Club penguin-ABE plan, and put it on because the underlying strategies to design the information access control plan. Our attribute revocation method can efficiently achieve both forward security and backward security.},
keywords = {Data Access Control (DAC), Multi-authority, attribute revocation, cloud storage, CPABE},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry