Main Article Content

Abstract

Data Outsourcing issues were monitored, where a trusted server is incharge of defining and enforcing access control policies. The main scope of the thesis is used to deliver the necessary data for the third party based on demand access. The user access the details on privilege level based on access control. The dual encryption is processed in the cloud environment which is varied from one group to another for secure data transmission process. The thesis summarizes a algorithm namely Enhanced cipher text-policy attribute to enforce access control policies with user revocation capability. This algorithm executed in the basis of setup process to create the master key and public key, key encrypting key generation process, attribute key generation process based on access control, encrypt the data using public key, re-encrypt process using group key and decryption of data. Dual encryption mechanism which takes advantage of the attribute-based encryption and selective group key distribution in each attribute group. Thus, different users are allowed to decrypt different pieces of data as per the security policy. This effectively eliminates the need to rely on the storage server for preventing unauthorized data access.

Article Details

How to Cite
A.G. Jananisrikamatch, & N. Zahira Jahan. (2019). Optimal service dynamic pricing for a cloud cache . International Journal of Intellectual Advancements and Research in Engineering Computations, 7(1), 711–717. Retrieved from https://ijiarec.com/ijiarec/article/view/998