Accounting and Privacy Preserving of Data Owner in Cloud Storage
A. Mohan1, P. Vamshikrishna2
1A. Mohan*, Asst. professor, Department Computer Science and Engineering, CBIT, Hyderabad, (Telangana), India.
2P. Vamshikrishna, PG Student, Department Computer Science and Engineering, CBIT, Hyderabad, (Telangana), India.
Manuscript received on March 27, 2021. | Revised Manuscript received on April 05, 2021. | Manuscript published on April 30, 2021. | PP: 14-17 | Volume-10 Issue-6, April 2021 | Retrieval Number: 100.1/ijitee.F87150410621| DOI: 10.35940/ijitee.F8715.0410621
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: People use the support of distributed computing however can’t completely believe the cloud suppliers to have protection and confidential information. To guarantee secrecy, data owners relocate encoded information rather than plain texts. To divide the encoded documents with different clients, Ciphertext-Policy Attribute-based Encryption (CP-ABE) can be utilized. But this cannot become secure against some other assaults. Many other schemes did not gave guarantee that the cloud provider has the power to check whether a downloader can unscramble or not. Consequently, these files are accessible to everybody who is approachable to the cloud storage. An intentionally harmful assailant can download a great many records to start Economic Denial of Sustainability (EDoS) attacks, it will to a great extent expend the cloud asset. The owner will bear all the expenses for the cloud storage but the cloud provider doesn’t provide the whole information about the access or usage. There is no transparency for the owner. We have to solve these concerns. In order to this we are going to propose a solution for securing the encrypted data from EDoS attacks and providing the owner whole usage information about the cloud storage. We are implementing by using the arbitrary access policy of CP-ABE.
Keywords: Access control, Cloud storage, Privacy-preserving