TY - JOUR TI - A Hierarchical Attribute Based Solution for Flexible and Scalable Access Control AU - Srikanth Thimmapuram AU - A Yashwanth Reddy AU - GVNKV Subba Rao JO - International Journal of Scientific Research in Computer Science, Engineering and Information Technology PB - Technoscience Academy DA - 2017/12/31 PY - 2017 DO - https://doi.org/10.32628/IJSRCSEIT UR - https://ijsrcseit.com/CSEIT1726199 VL - 2 IS - 6 SP - 597 EP - 602 AB - Conveyed processing has created as a champion among the most convincing models in the IT business starting late. Since this new preparing advancement anticipates that customers will invest their huge data to cloud providers, there have been growing security and assurance stresses on outsourced data. A couple of plans using quality based encryption (ABE) have been proposed for get the opportunity to control of outsourced data in appropriated processing; in any case, the dominant part of them encounter the evil impacts of solidness in completing complex access control courses of action. Remembering the true objective to recognize versatile, versatile, and fine-grained get the opportunity to control of outsourced data in dispersed registering, in this paper, we propose dynamic characteristic set-based encryption (HASBE) by growing figure content system property set-based encryption (ASBE) with a different leveled structure of customers. The proposed plot not simply finishes flexibility in view of its different leveled structure, yet moreover gains versatility and fine-grained get the opportunity to control in supporting compound attributes of ASBE. Similarly, HASBE uses various regard assignments for get the opportunity to slip by time to oversee customer dissent more gainfully than existing plans. We formally exhibit the security of HASBE in light of security of the figure content approach quality based encryption (CP-ABE) scheme by Bethencourt et al. moreover, examine its execution and computational diserse quality. We execute our arrangement and exhibit that it is both capable and versatile in overseeing access control for outsourced data in circulated processing with comprehensive investigations.