Implementation of Cloud Security by Identity Based Encryption

  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents the concept of encrypting the Data from the client to the client. But using some Key generator which sets the password for sending the information. In this concept, we have two types of passwords those are Private Key and Cloud outsourced key. The password will be sent to the client through email by using unique human identity, example Special Name, user id, IP address, etc. This Paper Deals with the client, private key generator and cloud. First, the user has to register by giving their basic details for having user name and password, have to enter their personal details, including contact number, email id, country, etc. When the user Id has created, they have to log through the client login. If they have an account they can be logged in if they are not having an account, they have to register. If any loss of password can reset the password by providing the email Id. This Paper can provide the Security of the user Data. In this Paper we are using cloud storage system.

Cite

CITATION STYLE

APA

Nagarajan*, M., Balaji, A., … Sathishkumar, G. (2019). Implementation of Cloud Security by Identity Based Encryption. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 9812–9816. https://doi.org/10.35940/ijrte.d9142.118419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free