000 -LEADER |
fixed length control field |
a |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20191016110338.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
191016b xxu||||| |||| 00| 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
AIKTC-KRRC |
Transcribing agency |
AIKTC-KRRC |
100 ## - MAIN ENTRY--PERSONAL NAME |
9 (RLIN) |
9883 |
Author |
Shaik, Naseera |
245 ## - TITLE STATEMENT |
Title |
On Security of Information Access for Multi Expert Cloud Frameworks |
250 ## - EDITION STATEMENT |
Volume, Issue number |
Vol.5(1), Jan-June |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Tamil Nadu |
Name of publisher, distributor, etc. |
i-manager's |
Year |
2018 |
300 ## - PHYSICAL DESCRIPTION |
Pagination |
7-11p. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Cloud computing has three types of services, mainly they are platform as service, software as service, and Infrastructure as service. So based on whatever the requirements they have, the consumers will select different services and try to use them. Securing the information in the cloud is the better way to access it. Cloud storage will have some different roles like data owner and the service who provides. Particular data owners will not interact with the different users. Now-a-days, the information access is one of the challenging tasks in the cloud storage. Cloud owner would not have fully trusted data owners. So for avoiding the untrusted servers of data by accessing very expressive information for that purposes, they will encrypt the data and so the user will have the valid keys, on whatever they expect to access the information. So in order to validate it they need a management scheme. In this paper, the authors have proposed an advanced attribute based encryption standard system to control the scrambled information. They have used Advanced Encryption standard algorithm for the encryption of secret keys. This approach demonstrated the performance of the services efficiently in a secured cloud environment. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
4622 |
Topical term or geographic name entry element |
Computer Engineering |
700 ## - ADDED ENTRY--PERSONAL NAME |
9 (RLIN) |
9884 |
Co-Author |
Gopichand, G. |
773 0# - HOST ITEM ENTRY |
Place, publisher, and date of publication |
Nagercoil i-manager Publication |
International Standard Serial Number |
2349-6835 |
Title |
i-manager's journal on cloud computing (JCC) |
856 ## - ELECTRONIC LOCATION AND ACCESS |
URL |
https://www.imanagerpublications.com/article/15367/23 |
Link text |
Click here |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Articles Abstract Database |