Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud

Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud

Shweta Kaushik, Charu Gandhi
Copyright: © 2021 |Volume: 15 |Issue: 2 |Pages: 24
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781799859871|DOI: 10.4018/IJISP.2021040102
Cite Article Cite Article

MLA

Kaushik, Shweta, and Charu Gandhi. "Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud." IJISP vol.15, no.2 2021: pp.29-52. http://doi.org/10.4018/IJISP.2021040102

APA

Kaushik, S. & Gandhi, C. (2021). Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud. International Journal of Information Security and Privacy (IJISP), 15(2), 29-52. http://doi.org/10.4018/IJISP.2021040102

Chicago

Kaushik, Shweta, and Charu Gandhi. "Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud," International Journal of Information Security and Privacy (IJISP) 15, no.2: 29-52. http://doi.org/10.4018/IJISP.2021040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cloud computing started a new era for IT enterprises. It allows the movement of application from local to remote location, massive data storage. Owner has access to centralized or decentralized data storage server, where data management handled by remote vendor. But, the heterogeneous and dynamic nature of cloud introduces security challenges. Among them, access control and integrity checking are most important which incur high consideration. Attribute-based encryption is one of the access control technique which allows integration of access policies, attributes, and encrypted data. In this paper, a new fine-grained decentralized data access control technique with user revocation has been proposed. Here, service provider is responsible for verifying the user authenticity. The proposed schema supports integrity checking and user revocation. The integrity checking proof validates that the user data is intact and revocation mechanism will help to revoke the user in linear time. Moreover, the proposed access control and authentication schemes are decentralized and comparable to other approaches.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.