[PDF][PDF] HASBE: a hierarchical attribute-based solution for flexible and scalable access control by separate encryption/decryption in cloud computing

S Gokuldev, S Leelavathi - International Journal of Engineering …, 2013 - researchgate.net
Cloud computing has emerged as one of the most important paradigms in the IT industry for
last few years. In general data owners and service providers are not in the same trusted …

[PDF][PDF] Scalable Access Control in Cloud Computing Using Hierarchical Attribute Set Based Encryption (HASBE)

A Vishnukumar, GM Boopathi… - International Journal of …, 2013 - Citeseer
Cloud Computing, an emerging computing paradigm, requires additional security which is
provided using HASBE and this can emerge as a new security feature for various …

[PDF][PDF] An enhanced Hasbe for cloud computing environment

DH Rachel, S Prathiba - … Journal of Computer Science and Mobile …, 2013 - academia.edu
In this era, even sensitive data is stored and shared on the internet using trusted third parties
and service providers. Cloud computing is one of the emerging technologies that is being …

[PDF][PDF] A survey on hierarchical attribute set based encryption (HASBE) access control model for cloud computing

V Kamliya, R Aluvalu - International Journal of Computer …, 2015 - academia.edu
Cloud computing refers to the application and service that run on a distributed system using
virtualized resources and access by common internet protocol and networking standard …

An Attribute-Based Encryption Method Using Outsourced Decryption and Hierarchical Access Structure

TN Mujawar, LB Bhajantri - Journal of Telecommunications and …, 2022 - yadda.icm.edu.pl
Cloud computing is being rapidly adopted by many organizations from different domains
and large amounts of data is stored in the cloud. In order to ensure data security, the …

Efficient multi-authority access control using attribute-based encryption in cloud storage

PS Challagidad, MN Birje - Procedia Computer Science, 2020 - Elsevier
Cloud users are outsourcing their data day-by-day resulting in huge amount of data storage
in Cloud server. Cloud service provider (CSP) themselves may go for modifying the data that …

A comprehensive review of access control mechanism based on attribute based encryption scheme for cloud computing

LB Bhajantri, TN Mujawar - International Journal of Advanced …, 2019 - igi-global.com
Cloud computing is the most prevailing paradigm, which provides computing resources and
services over the Internet. Due to immense development in services provided by cloud …

[PDF][PDF] Attribute-based encryption techniques in cloud computing security: an overview

AR Nimje, VT Gaikwad, HN Datir - Int. J. Comput. Trends Technol, 2013 - Citeseer
Cloud computing is going to be very famous technology in IT enterprises. For an enterprise,
the data stored is huge and it is very precious. All tasks are performed through networks …

Improving cloud security by enhanced HASBE using hybrid encryption scheme

B Poornima, T Rajendran - 2014 World Congress on …, 2014 - ieeexplore.ieee.org
Cloud computing has appeared as one of the most influential paradigms in the IT commerce
in recent years and this technology needs users to entrust their precious facts and figures to …

[PDF][PDF] Secure and Reliable Data sharing scheme using Attribute-based Encryption with weighted attribute-based Encryption in Cloud Environment

C Yadav, V Yadav, J Kumar - International journal of electrical and …, 2021 - academia.edu
░ ABSTRACT: The field of data management has been reformed by the Cloud computing
technologies which offered valuable establishments and amended the storage restrictions …