Abstract

Cloud computing is foreseen as the lineage framework model for Distributed Computing Environment and has escalated itself in due course of time owing to the advantages it provides to its service users, and also due to the unfolding ease, it renders to its customers. In recent times, especially because of pandemics, there has been a tremendous acceleration and dependency on the cloud environment and a sudden outburst in the increase of cloud users. However, it is significant to mention that the Cloud environment is quite susceptible to numerous attacks from intruders, thereby resulting in jeopardizing the system security and user privacy. Hence, one of the biggest challenges encountered by the researchers in the cloud domain is to propose algorithmic approaches or frameworks that ensure cloud security and maintain data integrity. Service users often hesitate to synchronize and store their data to cloud since they are not sure if their data privacy and confidentiality on the cloud environment will be preserved or compromised. This vulnerability of cloud systems eventually hinders cloud storage development. The objective of this paper is to project the trajectory towards maintaining privacy of the user data by assigning a restricted grant of permission to the user data stored on the cloud using cryptographic techniques. This work demonstrates an approach through which Identity validation along with Broadcast based Encryption mechanism aims to secure cloud data. This work depicts the functionality of various modules like set-up, encryption, and decryption processes, and the work is then finally compared with its peer research works based on the revocation rate.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call