2016
DOI: 10.11591/ijece.v6i2.pp770-777
|View full text |Cite
|
Sign up to set email alerts
|

HASBE access control model with Secure Key Distribution and Efficient Domain Hierarchy for cloud computing

Abstract: Cloud computing refers to the application and service that run on a distributed system using virtualized resources and access by common internet protocol and networking standard. Cloud computing virtualizes system by pooling and sharing resources. System and resources can be monitored from central infrastructure as needed. It requires high security because now day’s companies are placing more essential and huge amount of data on cloud. Hence traditional access control models are not sufficient for cloud comput… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…The decryption of the message is done only by the person who carries the equivalent private keys [12]. Recently, asymmetric algorithms are well recognised like elliptic curve cryptography (ECC) compared to symmetric, such as the AES algorithm [13], data encryption standard (DES) algorithm [14], and blowfish algorithm [15]. The AES algorithm used a simple algebraic structure and, therefore, easily hacked by the attacker.…”
Section: Introductionmentioning
confidence: 99%
“…The decryption of the message is done only by the person who carries the equivalent private keys [12]. Recently, asymmetric algorithms are well recognised like elliptic curve cryptography (ECC) compared to symmetric, such as the AES algorithm [13], data encryption standard (DES) algorithm [14], and blowfish algorithm [15]. The AES algorithm used a simple algebraic structure and, therefore, easily hacked by the attacker.…”
Section: Introductionmentioning
confidence: 99%
“…Authors proved that proposed scheme reduces the system complexity and improve the efficiency by maximizing the number of domain levels. Meanwhile, in Chennam and Lakshmi [12] proposed a ciphertext attribute-based encryption scheme which ensures a strong security policy for data sharing and protects the privacy of the cloud users with secure dynamic processing.…”
Section: Introductionmentioning
confidence: 99%