Cloud computing has become one of the most influential paradigms in the IT industry in recent years. This emerging computing technology demands the user to believe their data is secure to cloud providers, there have been increasing security and privacy concerns on outsourced data. Many Schemes emphasis on Attribute-Based Encryption (ABE) have been made for access control of user’s data in cloud computing; however, they lack from some major security issues. In order to realize flexible, reliable, and fine grained access control of available data in cloud computing, A Secured Hashing Algorithm is proposed which is a one-way cryptography technique with no decryption. This online storage mechanism is an integrated cloud backup suite that gives end-to-end visibility and full control of your data storage resources at corresponding rates. Cloud offers high scalability for all your storage needs your scalable data demands met from highly scalable archival to storage, equip your enterprises with the comprehensive storage suites needs. Cloud storage allows you to store unlimited data in an always available, highly durable and fully secure environment with Enterprises-Grade System Management for your commercial and budgetary needs. The key benefits are scalability, durability, support and predictable pricing. The proposed scheme not only achieves security due to its Secured Hashing Algorithm (SHA), but also inherits scalability and efficient access control in supporting compound attributes of ASBE (Attribute Set Based Encryption).
[1]
Kari Barlow,et al.
Like technology from an advanced alien culture: Google apps for education at ASU
,
2007,
SIGUCCS '07.
[2]
Rajkumar Buyya,et al.
Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility
,
2022
.
[3]
Ninghui Li,et al.
Automated trust negotiation using cryptographic credentials
,
2005,
CCS '05.
[4]
Robert H. Deng,et al.
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
,
2012,
IEEE Transactions on Information Forensics and Security.