Key-Cipher-Policy based ABE with Efficient Encryption of Multimedia Data at Data Centers of Cloud
Kavyasri M N1, Ramesh B2
1Kavyasri M N*, Assistant Professor, Department of Computer Science and Engineering, Malnad College of Engineering, Hassan (Karnataka), India.
2Dr. Ramesh B, Professor, Department of Computer Science and Engineering, Malnad College of Engineering, Hassan (Karnataka), India.
Manuscript received on 20 September 2021. | Revised Manuscript received on 12 April 2022. | Manuscript published on 30 May 2022. | PP: 73-76 | Volume-11 Issue-1, May 2022. | Retrieval Number: 100.1/ijrte.C64860910321 | DOI: 10.35940/ijrte.C6486.0511122
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud computing is relatively one among the new technologies that is attracting moreclients to adopt cloud storage for easy and convenient online data storage and sharing. Because of its efficient computations, it has attracted the attention of both industry and academia. Companies began outsourcing confidential data to cloud service data centres. These data storage applications have security concerns about data confidentiality and privacy. When data is moved to the cloud, the customer loses control of the data and must rely on the cloud service provider. To protect their data, clients must first guarantee that it is encrypted. Encryption is a promising method for keeping data private in the cloud. ABE is a potential technique for dealing with security challenges in data center cloud storage. The key benefit is that it allows flexible one-to-many encryption. We present a model termed key-Cipher-policy-based ABE in this study. It allows optimized and more secure access to data stored at the data centers of cloud. with optimized encryption and less encryption time.
Keywords: Key-Cipher-Policy Based Abe, Access Policy, Data Owner , Tree Access Structure.
Scope of the Article: Cloud Computing