Loading

Access Policy Based On Time and Attribute Factors In Public Cloud
Amrutha N1, Eldo P Elias2

1Amrutha N, Department of Department of Computer Science and Engineering, APJ Abdul Kalam Technological University, Thiruvananthapuram  (Kerala), India.

2Eldo P Elias, Assistant Professor, Department of Computer Science and Engineering, Mar Athanasius College of Engineering, Kothamangalam.

Manuscript received on 10 April 2019 | Revised Manuscript received on 17 April 2019 | Manuscript Published on 24 May 2019 | PP: 47-51 | Volume-8 Issue-6S3 April 2019 | Retrieval Number: F22100486S219/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Conducive information sharing and the cost decrease is the most vital favorable circumstances of the cloud storage devices. In order to profited by this utility the people and ventures redistribute their information to the cloud. While re-distributing the information to the cloud, it presents difficulties on safe guarding of information privacy. The most effective method to curb to get the gigantic measure of information turns out to be testing issue, particularly when the information are put away in cloud. To ensure information privacy here proposes attribute and time factors joined access control on time-delicate data. At the point when the access policies are sent in the plain text structure which may uncovers the security of information just as the client’s privacy. Cipher text-policy attribute-based encryption(CP-ABE) which gives information get to control by which the particular clients whose attributes are matched with the access policy can just decode the cipher texts. In existing techniques the attribute values in access policies are partially concealed. In this paper, an effective and mild information get to control strategy is proposed for information protection safeguarding to conceal the entire quality in the access policies. Attribute Bloom Filter[ABF] is utilized for checking even if an attribute is available in defined access policy and identify the accurate location in the access policy.

Keywords: Access Policy, Attribute Bloom Filter, Cloud Storage, CP-ABE.
Scope of the Article: Computer Science and Its Applications