FKG-ACS: FLEXIBLE KEY GENERATION WITH ACCESS CONTROL SCHEME IN CLOUD COMPUTING

  • L. Kannan Venugopal, Dr. E. Srinivasa Reddy
Keywords: KeyGeneration, ACS, CSP, FKG, ABE, KGT

Abstract

Data storage on Cloud servers has gotten out of hand since people keep outsourcing their data day by day. CSPs may, of their own will, tamper with the data that cause data integrity issues. A cloud server is violated by unauthorized users who unlawfully obtain access to the stored data. So there is more to be done in the cloud to provide data security, privacy, and access control. One single bottleneck may cause both safety and execution issues with these suggested ABE designs. The key challenge is that to protect against security and privacy threats, the infrastructure and data must be moved from the trusted domain of the data owner to the public cloud. However, security will remain the number one concern in cloud computing, largely about managing user access and protecting data privacy. This work introduces the FKG-ACS approach (Flexible Key Generation with Access Control Scheme for Data in the Cloud) as a safe and simple technique for controlling cloud-based data access. For efficient and flexible outsourced data access control, we reduce the redundant keys for the same set of users at the same level in the enterprise while implementing the key structure. The research showed that our suggested approach is extremely scalable, adaptable, and proven safe, given the security models already in place.

Published
2021-07-01
How to Cite
Dr. E. Srinivasa Reddy, L. K. V. (2021). FKG-ACS: FLEXIBLE KEY GENERATION WITH ACCESS CONTROL SCHEME IN CLOUD COMPUTING. Design Engineering, 1344- 1354. Retrieved from http://www.thedesignengineering.com/index.php/DE/article/view/2435
Section
Articles