Data Secure Algorithm in Cloud Storage

  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The challenging task is protecting the data which are uploaded to the cloud becomes bigger worries in a cloud environment system. In this type of security is needed for monitoring of data access in a cloud environment and is getting more and more attention in recent days. Few strategies which can be afford for top-secret and an unknown authentication for delicate information and it is more efficient than doing the encrypting data first and then sign or doing the sign first then encrypting the data. However, in so many previous work, delicate information of data users can be reveal to authority, and only the authority is responsible to answer to that type of attribute management and generation of key in the system. The proposed system states that confidentiality and protective of data access control over the cipher text scheme based on cloud security. It is provide a control measure, attribute confidentiality and guard the data’s of user concurrently in a multiple authority cloud system. Both the attributes of designcryptor and signcryptor can be kept secret by not knowing to the authorities and cloud storage server. Besides, decryption in the clouds for users as becomes meaningfully reduced by outsourcing the unwanted bilinear pairing process to the cloud server without humiliating the attribute privacy. The planned scheme is confirmed for protecting the standard model and has the skill to provide top secret, unforged, unknown authentication, and verifiability of public. The security analysis which are relating to comparison of difficulty and results of execution will indicate that the proposed system has the capacity to balance the security issues with respect to computation in hypothetical efficiency.

Cite

CITATION STYLE

APA

Senthilkumaran, T., Muruganandhan*, A., & Mathivanan, M. (2020). Data Secure Algorithm in Cloud Storage. International Journal of Innovative Technology and Exploring Engineering, 9(3), 2632–2635. https://doi.org/10.35940/ijitee.c8737.019320

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free