Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

St. Cloud State University

Theses/Dissertations

Cloud computing

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Data Sharing And Access Using Aggregate Key Concept, Rahul Veeravelli Mar 2018

Data Sharing And Access Using Aggregate Key Concept, Rahul Veeravelli

Culminating Projects in Information Assurance

Cloud Storage is a capacity of information online in the cloud, which is available from different and associated assets. Distributed storage can provide high availability and consistent quality, reliable assurance, debacle free restoration, and reduced expense. Distributed storage has imperative usefulness, i.e., safely, proficiently, adaptably offering information to others. Data privacy is essential in the cloud to ensure that the user’s identity is not leaked to unauthorized persons. Using the cloud, anyone can share and store the data, as much as they want. To share the data in a secure way, cryptography is very useful. By using different encryption techniques, …


Data Access In Multiauthority Cloud Storage: Expressive And Revocable Data Control System, Rajender Bhavika Pooja Gandi Dec 2017

Data Access In Multiauthority Cloud Storage: Expressive And Revocable Data Control System, Rajender Bhavika Pooja Gandi

Culminating Projects in Information Assurance

ABSTRACT

Cloud computing is rising enormously due to its advantages and the adaptable storage services being provided by it. Because of this, the number of users has reached the top level. The users will share the sensitive data through the cloud. Furthermore, the user can't trust the untrusted cloud server. Subsequently, the data access control has turned out to be extremely challenging in cloud storage framework. In existing work, revocable data access control scheme proposed for multi-authority cloud storage frameworks which supports the access control in light of the authority control. The authorized users who have desirable attributes given by …