2015
DOI: 10.12928/jti.v3i1.22-27
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Hierarchical Attribute Set Based Encryption (HASBE) Access Control Model for Cloud Computing

Abstract: Cloud computing refers to the application and service that run on a distributed system using virtualized resources and access by common internet protocol and networking standard. Cloud computing virtualizes system by pooling and sharing resources. System and resources can be monitored from central infrastructure as needed. It requires high security because of now a days companies going to put more essential and huge amount of data on cloud. That's why the reason traditional access control is not enough For the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 5 publications
(5 reference statements)
0
6
0
Order By: Relevance
“…HASBE structure contains a root master at the top, followed by multiple domain masters. Each domain master will have set of users and each user contains set of attributes [7]. To protect sensitive data from rivalaries, the data is stroed in encrypted form on servers, while the decryption keys are disclosed to authorized users only.…”
Section: Cipher Text Policy Attribute Based Encryption (Cp-abe)mentioning
confidence: 99%
See 4 more Smart Citations
“…HASBE structure contains a root master at the top, followed by multiple domain masters. Each domain master will have set of users and each user contains set of attributes [7]. To protect sensitive data from rivalaries, the data is stroed in encrypted form on servers, while the decryption keys are disclosed to authorized users only.…”
Section: Cipher Text Policy Attribute Based Encryption (Cp-abe)mentioning
confidence: 99%
“…Trusted Authority Figure 1. User level hierarchy of HASBE [7] Domain Authority Major roles in existing system are "Data Owner", Data Consumer", "Domain Authority" and "Trusted Authority". As discussed earlier user stores encrypted data on cloud, which can be regained by decrypting the same using private key provided.…”
Section: Existing Systemmentioning
confidence: 99%
See 3 more Smart Citations