This paper is published in Volume-5, Issue-1, 2019
Area
Big Data
Author
M. R. Sundarakumar
Co-authors
Dr. G. Mahadevan
Org/Univ
AMC Engineering College, Bengaluru, Karnataka, India
Pub. Date
31 January, 2019
Paper ID
V5I1-1245
Publisher
Keywords
Access control, Cloud computing, Data security, Secured Hashing Algorithm

Citationsacebook

IEEE
M. R. Sundarakumar, Dr. G. Mahadevan. Authorization for secured cloud storage through SHA-256, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
M. R. Sundarakumar, Dr. G. Mahadevan (2019). Authorization for secured cloud storage through SHA-256. International Journal of Advance Research, Ideas and Innovations in Technology, 5(1) www.IJARIIT.com.

MLA
M. R. Sundarakumar, Dr. G. Mahadevan. "Authorization for secured cloud storage through SHA-256." International Journal of Advance Research, Ideas and Innovations in Technology 5.1 (2019). www.IJARIIT.com.

Abstract

Cloud computing has become one of the most influential paradigms in the IT industry in recent years. This emerging computing technology demands the user to believe their data is secure to cloud providers, there have been increasing security and privacy concerns on outsourced data. Many Schemes emphasis on Attribute-Based Encryption (ABE) have been made for access control of user’s data in cloud computing; however, they lack from some major security issues. In order to realize flexible, reliable, and fine grained access control of available data in cloud computing, A Secured Hashing Algorithm is proposed which is a one-way cryptography technique with no decryption. This online storage mechanism is an integrated cloud backup suite that gives end-to-end visibility and full control of your data storage resources at corresponding rates. Cloud offers high scalability for all your storage needs your scalable data demands met from highly scalable archival to storage, equip your enterprises with the comprehensive storage suites needs. Cloud storage allows you to store unlimited data in an always available, highly durable and fully secure environment with Enterprises-Grade System Management for your commercial and budgetary needs. The key benefits are scalability, durability, support and predictable pricing. The proposed scheme not only achieves security due to its Secured Hashing Algorithm (SHA), but also inherits scalability and efficient access control in supporting compound attributes of ASBE (Attribute Set Based Encryption).
Paper PDF