Secure Access Control Method in Cloud Environment Using Improved Attribute Based Encryption Technique
S.U.Muthunagai1, R. Anitha2

1S.U.Muthunagai , Department of Computer Science and Engineering, Sri Venkateswara College of Engineering, Chennai (Tamil Nadu), India.
2R. Anitha, Department of Computer Science and Engineering, Sri Venkateswara College of Engineering , Chennai (Tamil Nadu), India.

Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 1031-1035 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7082068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Maintaining the user data on a proprietary nearby storage device becomes challenging task and the cloud-based storage addresses this issue possibly by storing them in a remote database through which user can access the files from anywhere. Cloud computing is on-demand computing, which provides various resources to the users, especially data storage and computing power, without the direct intervention of the user in the mode of pay per use. On moving to the Cloud storage, resources are shared but that hardware is likely being shared by other organizations too. The suspicion is due largely to the fact that the approach itself feels insecure, with user data deposited on servers and systems do not own or access control over the data. The data agreement may occur due to the intrusion of attackers in the cloud environment. Therefore, highly secure and dynamic access control methods are required to preserve and access the data in the cloud environment with minimal delay in network traffic. In this paper, the above security issues are addressed by fragmenting the user uploaded data and wrapping of fragmented data with the proposed Improved Attribute Based Encryption technique to accumulate at various locations. Preserving of cipher text at various points prevents the user uploaded data not been intervened by any intruders. Finally, the data located at the distinct point are retrieved with decryption technique and hence it scales down the network traffic occurred during the retrieval of user-uploaded data from the various point.
Keywords: Cloud Security, Fragmentation, Encryption, Decryption, Network Traffic, Attribute Based Encryption.

Scope of the Article: Cloud Computing