Loading

Multi Attribute Point of Randomized Key Service Level Attribute-based Encryption Standards for Secure Cloud Computing in Cloud Environment
S. Noordeen1, K. Dinakaran2

1S. Noordeen, Research Scholar, Bharathiar University, Coimbatore (Tamil Nadu), India.
2Dr. K. Dinakaran, Professor and Head, Department of Computer Science and Engineering, PMR Engineering College, Maduravayal, Chennai (Tamil Nadu), India.
Manuscript received on 26 April 2019 | Revised Manuscript received on 03 May 2019 | Manuscript Published on 08 May 2019 | PP: 632-638 | Volume-7 Issue-5S3 February 2019 | Retrieval Number: E12130275S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The growing size of information, security became the risk of access from centralized resource providers deploy them into the cloud, where authorized users could access them. To provide security to the cloud resources there are many service level agreements (SLA) are provided, but the problem of public auditability and data dependence is unresolved due to challenge in key auditing. The service level needs the security based on key auditing by choosing the different service level. To propose a multi-level attribute based randomized key auditing encryption service (MARK-SLE) to improve the service level of security in the cloud environment. Additional to third part key aggregate level with prime factor verification. Then compute the encryption and decryption of attributes accessed at each level to provide cloud security. Whatever the data modified by any user will be updated so that to provide data audit and data dependence by swapping the reference of address in the block modified. The method maintains user access history, where the user access details are stored. The access history is being used to make decisions on providing service to the user request. The proposed method increases the efficiency of public auditability and tampers resistance.
Keywords: Cloud Computing, Data Security, Public Auditing, Service Level Encryption, Cloud Security.
Scope of the Article: Cloud Computing