An Effective Data Access Method for Public Cloud Data Storage
M. Laxmaiah1, Teja2, M. Narendra3

1M. Laxmaiah, Department of Computer Science and Engineering, CMR Engineering College, Medchal (D), Hyderabad (Telangana), India. 

2Teja, Department of Computer Science and Engineering, CMR Engineering College, Medchal (D), Hyderabad (Telangana), India. 

3M. Narendra, Department of Computer Science and Engineering, CMR Engineering College, Medchal (D), Hyderabad (Telangana), India. 

Manuscript received on 04 September 2019 | Revised Manuscript received on 13 September 2019 | Manuscript Published on 26 October 2019 | PP: 105-109 | Volume-8 Issue-11S2 September 2019 | Retrieval Number: K101709811S219/2019©BEIESP | DOI: 10.35940/ijitee.K1017.09811S219

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: These days attribute-based encryption has been gotten as a promising strategy to give versatile and secure data to oversee the conveyed storage in the cloud registering environment. In the attribute-based encryption plan, the single property pro should execute the customer legitimacy check and mystery key flow, and thusly, its outcomes. Customers may be stuck in the believing that at a stretch get their mystery keys and choose to get the required data from Cloud. So as to maintain a strategic distance from the single-point execution bottleneck, we are proposing multi-master access control plan which will assess the issue such way that it gives increasingly successful access control on cloud data to the clients.

Keywords: Cloud Storage, Central Authority, Attribute Authority, Data Security.
Scope of the Article: Data Warehousing