Efficient Privacy Preserving Approach for Scalable Data Outsourcing in Cloud Storage |
Author(s): |
| R. Radha , Bharathiyar Arts and Science College for Women, Deviyakurichi, Salem ; C. Menaga, Bharathiyar Arts and Science College for Women, Deviyakurichi, Salem |
Keywords: |
| Cloud storage, Attribute base encryption, Identity base encryption, Cloud storage, data sharing, and key- aggregate encryption |
Abstract |
|
Cloud computing technology is widely recycled so that the data can be subcontracted on cloud can retrieved easily. Different members can segment that data through dissimilar virtual machines but present on single physical machine. But the thing is user don’t have physical mechanism over the outsourced data. The need is to share data firmly among users. The cloud service provider and users substantiation is necessary to make sure no loss or outflow of users data. Privacy protective in cloud is significant make sure the users uniqueness is not revealed to everybody. On cloud anyone can share facts as much they want to i.e. only selected content can be shared. Cryptography helps the data proprietor to share the data to in safe way. So user encodes data and uploads on server. Different encryption and decryption keys are produced for dissimilar data. The encryption and decryption keys may be different for dissimilar set of data. Only those set of decryption keys are shared that the designated data can be decrypted. Here a public-key cryptosystems which generate a cipher text which is of constant size. So that to transfer the decryption rules for quantity of cipher text. The difference is one can assemble a set of secret keys and make them as small size as a single key with allotment the same ability of all the keys that are formed in a group. This compact combined key can be efficiently sent to others or to be stored in a keen card with little secure storing. |
Other Details |
|
Paper ID: IJSRDV4I110261 Published in: Volume : 4, Issue : 11 Publication Date: 01/02/2017 Page(s): 498-500 |
Article Preview |
|
|
|
|
