S.Abirami,
J.Sangeetha
1PG Student STET
Women’s college, Mannargudi.
2Professor of CS
department, STET Women’s college, Mannargudi.
Cloud computing is a rising technology delivers a lot of new challenges
for data security and access control when clients outsource sensitive data for
offering on cloud servers, which computing standard assets of the computing framework are given
as a service over the Internet. As guaranteeing as it may be, this standard
additionally are not inside the same trusted dominion as data possessors. In
any case, in completing thus, these results unavoidably present a substantial
processing overhead on the data possessor for key distribution and data
administration when fine-grained data access control is in demand, and
subsequently don't scale well. The issue of at the same time accomplishing
fine-grainedness, scalability, and data confidentiality of access control
really still remains uncertain. This paper addresses this open issue by, on one
hand, characterizing and implementing access policies based on data qualities,
and, then again, permitting the data owner to representative the majority of
the calculation undertakings included in fine-grained data access control to
un-trusted cloud servers without unveiling the underlying data substance. We
accomplish this goal by exploiting and combining techniques of decentralized
key policy Attribute Based Encryption (KP-ABE). Extensive investigation shows
that the proposed approach is highly efficient and secure. Cloud computing is typically defined as a
type of computing that relies on sharing computing resources rather than having
local servers or personal devices to handle applications .Cloud Computing is
the internet-based storage for files, applications, and infrastructure. Cloud
computing involves deploying groups of remote servers and software networks
that allow centralized data storage and online access to computer services or
resources. Centralized computing is computing done at a central location, using
terminals that are attached to a central computer. The computer itself may
control all the peripherals directly or they may be attached via a terminal
server. Information security is a critical issue in cloud computing
environments, so the nature of cloud computing raises serious issues regarding
user authentication, information integrity and data confidentiality. Propose a
new decentralized access control scheme is
for secure data storage in clouds that supports anonymous
authentication. In the proposed scheme, the cloud verifies the authenticity of
the series without knowing the user's identity before storing data. Our scheme
also has the added feature of access control in which only valid users are able
to decrypt the stored information. The scheme prevents replay attacks and
supports creation, modification, and reading data stored in the cloud, also
address user revocation. Moreover, authentication and access control scheme is
decentralized and robust, unlike other access control schemes designed for
clouds which are centralized. The communication, computation, and storage
overheads