A SECURE AND VERIFIABLE ACCESS CONTROL SCHEME FOR BIG DATA STORAGE IN CLOUDS
Author(s):
AISWARYA LEKSHMI A C
Keywords:
ciphertext, legitimacy, optimization
Abstract
Enormous information may be a tall volume, and/or high speed, tall assortment data resource, which needs unused shapes of preparing to empower upgraded choice making, understanding revelation, and prepare optimization. Due to its complexity and huge volume, overseeing huge information utilizing on hand database administration devices is troublesome. An successful arrangement is to outsource the information to a cloud server that has the capabilities of putting away enormous information and handling users' get to demands in an productive way. For case in wellbeing applications, the genome data ought to be safely put away in an e-health cloud as a single sequenced human genome is around 140 gigabytes in estimate. Be that as it may, when a information proprietor outsources its information to a cloud, touchy data may be uncovered since the cloud server isn't trusted; in this manner regularly the ciphertext of the information is put away within the seem. But how to upgrade the ciphertext put away in a cloud when a modern get to approach is assigned by the information proprietor and how to confirm the authenticity of a client who extraordinary to get to the information are still of extraordinary concerns.
Article Details
Unique Paper ID: 163055

Publication Volume & Issue: Volume 0, Issue no

Page(s): 220 - 223
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Latest Publication

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews