Integrity Checking in Cloud Storage and Policy Based User Revocation using Attribute Based Encryption
V. Umadevi1, E. K. Girisan2

1Dr. V. Umadevi, Department of Computer Science, Thavathiru Santhalinga Adigalar Arts, Science and Tamil College, Coimbatore, (Tamil Nadu), India.
2Mr. E. K. Girisan, Department of Computer Science, Sree Narayana Guru College, Coimbatore, (Tamil Nadu), India.

Manuscript received on 12 August 2019. | Revised Manuscript received on 19 August 2019. | Manuscript published on 30 September 2019. | PP: 6905-6911 | Volume-8 Issue-3 September 2019 | Retrieval Number: C5862098319/2019©BEIESP | DOI: 10.35940/ijrte.C5862.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Applications that range over various mists are frequently observed to be powerless against security dangers. Such profoundly heterogeneous situations need a fine-grained access control system like Attribute-based Access Control for upholding security. One of the most encouraging applications in distributed computing is online information sharing. Step by step instructions to share client information securely and productively has turned out to be one of the most testing issues in distributed computing. Be that as it may, this postures new provokes identified with making secure and solid information stockpiling over questionable specialist co-ops. The principle objective of distributed computing is the means by which to verify, secure the information and procedure. In this study, we find the issue of guaranteeing the respectability of data in cloud computing. Specifically, we consider techniques for decreasing the weight of producing a consistent measure of metadata at the customer side. Ascribe division chooses whether to momentarily disavow client approval as indicated by property subset. Furthermore, we propose another model called Policy-based Attribute Based Access Control (Pa-ABAC) utilizing half breed property based encryption. Our goal is to officially determine the conduct of various components of the proposed model in a cloud domain. This is imperative to build up a substantial security arrangement for a cloud situation free from determination mistakes and irregularities.
Index Terms: Data Integrity, Policy Based Access Control and Revocation, Hybrid Attribute Based Encryption, Dynamic key Generation Algorithm

Scope of the Article:
Next Generation Internet & Web Architectures