Volume- 3
Issue- 4
Year- 2016
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Taniya Jain
This review paper include the introduction part of Big data environment with its various access control policy . The main aim of this paper is to make a survey of some existing control policy and introduce the security issue in the Cloud environment for the big data.
[1]Puya Ghazizadeh, Ravi Mukkamala & Stephan Olariu, 2013, “Data Integrity Evaluation in Cloud Database-as-a-Service”, IEEE Ninth World Congress on Services, 978-0-7695-5024-4/13, DOI 10.1109/SERVICES.2013.40, pp.280-285.
[2] Ling Lang & Lin wang, 2012, “Research on cloud computing and key technologies”, IEEE International Conference on Computer Science and Information Processing (CSIP), 978-1- 4673-1411-4/12, pp.863-866
[3] Mohammed A. AlZain & Ben Soh and Eric Pardede, 2013, “A New Approach Using Redundancy Technique to Improve Security in Cloud Computing”, pp. 230-235.
[4] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attributebased encryption for fine-grained access control of encrypted data,” in CCS’06. ACM, 2006, pp. 89–98.
[5] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased encryption,” in S&P’07. IEEE, 2007, pp. 321–334.
[6] B. Waters, “Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization,” in KC’11. Springer, 2011, pp. 53–70.
[7] A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters,“Fully secure functional encryption: Attribute-based cryption and (hierarchical) inner product encryption,” in EUROCRYPT’10. Springer, 2010, pp. 62–91.
[8] A. B. Lewko and B. Waters, “Decentralizing attribute-based encryption,”in EUROCRYPT’11. Springer, 2011, pp. 568–588.
[9] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, andvfine-grained data access control in cloud computing,” in INFOCOM’10.IEEE, 2010, pp. 534–542.
[10] K. Yang, X. Jia, and K. Ren, “Attribute-based fine-grained access control with efficient revocation in cloud storage systems,” in AsiaCCS’13. ACM, 2013, pp. 523–528.
[11] K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, “DACMACS: Effective Data Access Control for Multiauthority Cloud Storage Systems,” IEEE Trans. Info. Forensics Security, vol. 8, no. 11, pp. 1790–1801, 2013.
[12] K. Yang and X. Jia, “Expressive, efficient, and revocable data access control for multi-authority cloud storage,” IEEETrans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1735–1744, July 2014.
[13] A. Sahai, H. Seyalioglu, and B. Waters, “Dynamic credentials and ciphertext delegation for attribute-based encryption,” in CRYPTO’12. Springer, 2012, pp. 199–217.
[14]Amir Mohamed Talib, Rodziah Atan, Rusli Abdullah & Masrah Azrifah, 2011, “CloudZone: Towards an Integrity Layer of Cloud Data Storage Based on Multi Agent System Architecture”, IEEE Conference on 14
[15] Basant Narayan Singh,” Cloud Service Models – SaaS PaaS IaaS - Which One is for You?”, posted Tuesday, June 28, 2011
(M.Tech Scholar) Asst. Prof. Javed Akhtar Khan Department of Computer Science & Engineering Takshshila Group of Institute INDIA
No. of Downloads: 6 | No. of Views: 726
B.V.Satish Babu, Dr. K.Suresh Babu, Durga Prasad Kare.
October 2023 - Vol 10, Issue 5
Kushal Kumar, Khushboo Tripathi, Rashmi Gupta.
June 2023 - Vol 10, Issue 3
GiriBabu Sadineni, Janardhan Reddy D , Adusumalli Niharika, Kommu Tejaswini, Golla Vandana, Padmini Biyyapu.
April 2023 - Vol 10, Issue 2