The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


The advancements made in the Information and Communication Technologies (ICT) has increased the number of social users. A new promising technology, named, cloud computing resolves most of the recent real-time issues. Data sharing is one of the most recent topics explored by the researchers. By sharing the common attributes, the data owners can elegantly solve the data redundancy, cost minimization/ maximization, security etc. This kind of sharing attributes are profound in healthcare and military applications. Prior works have explored the study of data sharing concepts, yet it fails to satisfy the data owner’s requirements. In this paper, we have proposed an enhanced file hierarchy system in specific to attribute-based encryption schemes. Meanwhile, the file hierarchical system is controlled by data access control layer of cloud technologies. By devising the access control layer, we can efficiently arrange encrypted files in hierarchical model with reduced storage and time cost of encryption and decryption. Experimental analysis has shown the efficacy of our proposed scheme in terms of better achieved storage consumption with increased number of files and attributes.

Keywords

Attributes, Cloud Computing, Data Owner, Encryption, File Hierarchy Systems, Storage Consumption
User