Our website is currently undergoing scheduled maintenance. We apologize for any inconvenience. Services will resume on Monday morning, and all pending papers will be uploaded accordingly.
editor@ijprems.com
WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics(up)
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • fee
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • Faq
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Developing Multiparty Access Control Mechanism for Multi-Owner by Providing Secured Data Group Sharing using Cloud Computing

J.Charlin Carmal Carmal

Download Paper

Paper Contents

Abstract

Cloud services uses the cryptographic techniques that employs encryption techniques to secured that will be used or stored in the cloud and also provide the data confidentiality in cloud computing. Cloud computing uses the concept of cipher text, which encrypts the text based on an algorithm but it could not provide the privacy aspects over multiple owners. Meanwhile, we must provide security guarantees for the sharing data files since they are outsourced. Thus it makes co- owners unable to control data disseminators can actually disseminate their data. Because of the frequent change in membership, sharing data while providing privacy aspects is still a challenging issue. The data owners could broadcast encrypted data to a group of receivers at one time by specifying these receiver`s identities in a convenient and secure way. Thus we provide a secure data group sharing and conditional dissemination scheme with multi-owner in cloud computing environments Disseminate the data over the different user with satisfying constrain access policies with multi party access control mechanism in the cipher text. By using this functionality, we can restrict the users accessibility based on their rights and constrains over the data. Data co-owners can add new access policies for the privacy controls. It includes the full permit, owner priority and majority permit to solve the privacy conflicts problem caused by different access policies

Copyright

Copyright © 2023 J.Charlin Carmal. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS30400002266
Publish Date: 2023-04-05 15:38:19
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Only Whatsapp(+091) 909-885-5509
  • editor@ijprems.com
  • Mon-Fri: 9:00 AM - 5:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science. All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us