Access Control and Data Updationin Cloud Computing Essay

Access Control and Data Updationin Cloud Computing Essay

The CSP keeps cloud infrastructures, which pool the bandwidth, space for storage, and CPU power of several cloud servers to supply 24/7 solutions. The CSP primarily provides two solutions: data storage space and re-encryption. After acquiring the encrypted data from the info owner, the CSP will shop the data. On getting a data access demand from a consumer, the CSP will re-encrypt the ciphertext predicated on attributes, and come back the re-encrypted ciphertext.
The data owner outsources a couple of data to the cloud. Each little bit of data can be encrypted before outsourcing. The info owner is accountable for identifying the access structure for every data, and distributing key keys to each consumer. Whenever a user wishes to gain access to data, he'll first request suitable keys from the info owner, and then demand the CSP to download the ciphertext. If his gain access to right works well when he requests the info, he can effectively execute decryption. The info owner is the only 1 permitted to give read/write authorization to users.
Data users with write authorization is capable of doing the updations and also delete the info within their effective time frame. An average cloud environment is proven in Fig 1.
Fig 1 An average cloud environment
3.2 Style Goals The main goal of our scheme is normally to achieve,
1) Data confidentiality: The info is encrypted

Related Essays