Visible to the public Analysis on the Development of Cloud Security using Privacy Attribute Data Sharing

TitleAnalysis on the Development of Cloud Security using Privacy Attribute Data Sharing
Publication TypeConference Paper
Year of Publication2022
AuthorsYarava, Rokesh Kumar, Rao, G.Rama Chandra, Garapati, Yugandhar, Babu, G.Charles, Prasad, Srisailapu D Vara
Conference Name2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)
Keywordsauthorityverification, cloud computing (CC), codes, Collaboration, Costs, CP-ABE, data privacy, hiddenaccess(HA) policy, information and communication technology, linear secret share scheme (LSSS), personal health record (PHR), policy-based governance, privacy, pubcrawl, research and development (R&D), Safety, Scalability, Solids
AbstractThe data sharing is a helpful and financial assistance provided by CC. Information substance security also rises out of it since the information is moved to some cloud workers. To ensure the sensitive and important data; different procedures are utilized to improve access manage on collective information. Here strategies, Cipher text-policyattribute based encryption (CP-ABE) might create it very helpful and safe. The conventionalCP-ABE concentrates on information privacy only; whereas client's personal security protection is a significant problem as of now. CP-ABE byhidden access (HA) strategy makes sure information privacy and ensures that client's protection isn't exposed also. Nevertheless, the vast majority of the current plans are ineffectivein correspondence overhead and calculation cost. In addition, the vast majority of thismechanism takes no thought regardingabilityauthenticationor issue of security spillescapein abilityverificationstage. To handle the issues referenced over, a security protectsCP-ABE methodby proficient influenceauthenticationis presented in this manuscript. Furthermore, its privacy keys accomplish consistent size. In the meantime, the suggestedplan accomplishes the specific safetyin decisional n-BDHE issue and decisional direct presumption. The computational outcomes affirm the benefits of introduced method.
DOI10.1109/ICEEICT53079.2022.9768608
Citation Keyyarava_analysis_2022