Statistics

    Map

Twitter

A Review on Access Control Policy and Key Generation in Data Sharing
( Vol-6,Issue-2,February 2019 )
Author(s):

Mr. Mangnale Gajanan K., Prof. Korde A. L., Dr R K Patil, Dr R K Sawant

Keywords:

Data Sharing, Attribute based mechanism, Access Control policy, Data Confidentiality.

Abstract:

This review is based on the access control policy and data sharing mechanisms. We know that Cloud computing is the best & proficient manner on handle our information remotely. Data Confidentiality is one of the chief problem now a day’s. Security is also matters while data storing & sharing with others. Whenever we are using platform like cloud trust factor also considered. A lot of unauthorized community tries to access & steal the confidential data. In the current time cryptographic technologies are used to secure data. Sharing cloud data in between group of users at a best level is still a complicated issue, especially when dealing with dynamic users group .In this paper we present and discuss propose system which deals with dynamic user group problem like revocation and data privacy & make access control policy.

ijaers doi crossref DOI:

10.22161/ijaers.6.2.6

Paper Statistics:
  • Total View : 32
  • Downloads : 8
  • Page No: 039-042
Cite this Article:
MLA
Mr. Mangnale Gajanan K. et al ."A Review on Access Control Policy and Key Generation in Data Sharing ". International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)),vol 6, no. 2, 2019, pp.039-042 AI Publications, doi:10.22161/ijaers.6.2.6
APA
Mr. Mangnale Gajanan K., Prof. Korde A. L., Dr R K Patil, Dr R K Sawant(2019).A Review on Access Control Policy and Key Generation in Data Sharing . International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)),6(2), 039-042. http://dx.doi.org/10.22161/ijaers.6.2.6
Chicago
Mr. Mangnale Gajanan K., Prof. Korde A. L., Dr R K Patil, Dr R K Sawant. 2019,"A Review on Access Control Policy and Key Generation in Data Sharing ". International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)).6(2):039-042. Doi: 10.22161/ijaers.6.2.6
Harvard
Mr. Mangnale Gajanan K., Prof. Korde A. L., Dr R K Patil, Dr R K Sawant. 2019,A Review on Access Control Policy and Key Generation in Data Sharing , International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)).6(2), pp:039-042
IEEE
Mr. Mangnale Gajanan K., Prof. Korde A. L., Dr R K Patil, Dr R K Sawant."A Review on Access Control Policy and Key Generation in Data Sharing ", International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)),vol.6,no. 2, pp.039-042,2019.
Bibtex
@article {mr.mangnalegajanank.2019a,
title={A Review on Access Control Policy and Key Generation in Data Sharing },
author={ Mr. Mangnale Gajanan K., Prof. Korde A. L., Dr R K Patil, Dr R K Sawant},
journal={International Journal of Advanced Engineering Research and Science},
volume={6},
year= {2019},
}
Share:
References:

[1] ShengminXu, Guomin Yang, Yi Mu and Robert H. Deng Fellow, "Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in Cloud", IEEE Transactions on Information Forensics and Security,1556-6013 (c) 2018 IEEE.
[2] YAN YANG, XINGYUAN CHEN, HAO CHEN, AND XUEHUI DU, "Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing", IEEE Access ,2169-3536 (c) 2018 IEEE.
[3] YING ZUOBIN, WEI LU, LI QI, LIU XIMENG AND CUI JIE, "A Lightweight Policy Preserving EHR Sharing Scheme in the Cloud", IEEE Access,2169-3536 (c) 2018 IEEE.
[4] Yinghui Zhang, Member, IEEE, Dong Zheng, Robert H. Deng, "Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control", IEEE INTERNET OF THINGS JOURNAL, VOL. 3, NO. 1, APRIL 2018
[5] Hu Xiong and JianfeiSun , "Comments on Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing", IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 14, NO. 4, JULY/AUGUST 2017
[6] HUIJUN ZHU , LICHENG WANG, HASEEB AHMAD, AND XINXIN NIU, "Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing", IEEE Access, 2169-3536 2017 IEEE.
[7] Mr.SourabhaVijaykumarPashte, Mr.Chetan J. Awati, "Overcome Key Escrow Problem with Attribute-Based Data Access Policy & Efficient Cloud Environment", 978-1-5386-4008-1/17,2017 Third International Conference on Computing, Communication, Control And Automation©2017 IEEE
[8] Javier Herranz, "Attribute-based encryption implies identity based encryption",IET Inf. Secur., 2017, Vol. 11 Iss. 6, pp. 332-337 © The Institution of Engineering and Technology 2017
[9] Shulan Wang, Kaitai Liang, Joseph K. Liu, Jianyong Chen, Jianping Yu, WeixinXie, "Attribute-Based Data Sharing Scheme Revisited in Cloud Computing", IEEE Transactions on Information Forensics and Security,1556-6013 (c) 2016 IEEE.
[10] Long Li, TianlongGu, Liang Chang, ZhouboXu, Yining Liu, JunyanQian, "A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram", IEEE Access, 2169-3536 (c) 2016 IEEE.
[11] Jun Ho Huh, Rakesh B. Bobba, Tom Markham, David M. Nicol, Julie Hull, Alex Chernoguzov, HimanshuKhurana, and Kevin Staggs ,Jingwei Huang, "Next-Generation Access Control for Distributed Control Systems", IEEE INTERNET COMPUTING ,1089-7801/16 © 2016 IEEE
[12] Kan Yang, Qi Han, Hui Li, KanZheng, Zhou Su and Xuemin (Sherman) Shen, "An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy", IEEE Internet of Things Journal,2327-4662 (c) 2016 IEEE.
[13] Sikhar Patranabis, Yash Shrivastava and Debdeep Mukhopadhyay, "Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud", IEEE Transactions on Computers, 0018-9340 (c) 2016 IEEE.
[14] Chunqiang Hu, WeiLi, Xiuzhen Cheng, JiguoYu, Shengling Wang, and Rongfang Bie, "A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds", IEEE TRANSACTIONS ON BIG DATA,2332-7790 (c) 2016 IEEE.
[15] Shulan Wang, Junwei Zhou, Joseph K. Liu, Jianping Yu, JianyongChen,WeixinXie, "An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing", IEEE Transactions on Information Forensics and Security,1556-6013 (c) 2015 IEEE.