International Journal of Engineering Development and Research, 2016
Cloud computing is a rising computing standard in which the computing framework is given as a ser... more Cloud computing is a rising computing standard in which the computing framework is given as a service over the Internet. The Cloud computing tool gives facility of data storage and access for cloud users, but when outsourcing the data to a third party causes safety issue of cloud data so data are protected by restricting the data. We propose a new decentralized access control scheme for secure data storage in the clouds that supports anonymous authentication where identity of the user is protected from the cloud during authentication. The architecture is decentralized, meaning that there can be several KDCs for key management. Revoked users cannot access data after they have been revoked. The proposed scheme is resilient to replay attacks. In addition to this a new symmetric key cryptographic method called Modern encryption Standard (MES)-II presents method which can be effective to encrypt various types of plain text files and the method is free from standard cryptography attacks n...
International Journal of Engineering Development and Research, 2016
Cloud computing is a rising computing standard in which the computing framework is given as a ser... more Cloud computing is a rising computing standard in which the computing framework is given as a service over the Internet. The Cloud computing tool gives facility of data storage and access for cloud users, but when outsourcing the data to a third party causes safety issue of cloud data so data are protected by restricting the data. We propose a new decentralized access control scheme for secure data storage in the clouds that supports anonymous authentication where identity of the user is protected from the cloud during authentication. The architecture is decentralized, meaning that there can be several KDCs for key management. Revoked users cannot access data after they have been revoked. The proposed scheme is resilient to replay attacks. In addition to this a new symmetric key cryptographic method called Modern encryption Standard (MES)-II presents method which can be effective to encrypt various types of plain text files and the method is free from standard cryptography attacks n...
Uploads
Papers by Swati Bairagi