Secure Access Control For Cloud Data Using Attribute Based Encryption Schemes
Divya Vadlamudi1, Sunanda Garlapati2, Qhairunnisa Syed3, Krishna Kishore Nunna4

1Divya Vadlamudi, Department of CSE, KL University, Vijayawada (A.P), India.
2Sunanda Garlapati, Department of CSE, KL University, Vijayawada (A.P), India.
3Qhairunnisa Syed, Department of CSE, KL University, Vijayawada (A.P), India.
4Krishna Kishore Nunna, Department of CSE, KL University, Vijayawada (A.P), India.
Manuscript received on 27 April 2019 | Revised Manuscript received on 09 May 2019 | Manuscript Published on 17 May 2019 | PP: 508-512 | Volume-7 Issue-6S4 April 2019 | Retrieval Number: F11050476S419/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Access Control is a pervasive procedure to shield information from an unapproved client. In many access control frameworks, each data may lawfully be gotten to by a few unique clients. Such a framework is regularly executed by utilizing an authenticated server. The server should be able to store every information with the significant access control Policy. A client would sign in and the server will selectively show the data the client is allowed to access. On the off chance that the server is harmed then the attacker can access all the delicate information. One characteristic answer for the above issue is to implement a cryptographically encrypted access control system, for example, Attribute Based Encryption (ABE). Attribute Based Encryption is envisioned as a basic instrument for keeping an eye on the issue of protected and fine-grained data sharing and access control. ABE has a noteworthy advantage standpoint over the conventional Public Key Cryptography natives as it accomplishes flexible one-to-many encryption rather than one- to-one. The focal point of this work is to discover an approach to make Attribute-based encryption (ABE) more reasonable for access control which we have done using Intelligent Cryptography. Our work includes data distribution algoritms based on sensitivity of data.
Keywords: Attribute Based Encryption, Public Key Cryptography.
Scope of the Article: Cloud Computing and Networking