Abstract

Abstract: Data outsourcing is now subject to additional safety and privacy concerns as a result of the rise in cloud computing demand. Because data management was moved to words an unstable cloud during the outsourcing stage of the data, data permit control identified a key problem in the cloud repository. This analysis uses the Attribute-Based Access Control method to control access to the cloud storage to solve the issue. The data is reserved in the cloud and protected by strict security before the user may access it. This model takes into account specific properties of the cloud data stored in the database authentication process in order to store the information of registered collections alongside the user-committed data. Each of the clusters has a unique set of benefits, including usernames, group names, and registry message authorization codes. Prior to sending the data to the service provider, it should be encrypted to ensure its security. However, there may occasionally be problems with the supplier’s security measures. In this outcome, a variety of metrics are analyzed, such as the amount of time used for encryption, decryption, key generation, and time consumption. The numerous existing techniques, like Nth Truncated Ring Units and Cipher text. Constraints on online storage access may make policy attribute-based encryption impossible. The time of encryption is reduced by 20% and 36%, respectively, via NTRU and CP-ABE. The proposed technique decrypts data 10.64% faster than the current approach, which decrypts data 19% more slowly.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.