Vulnerability Tracking in Cloud using Encryption

  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Secure hunt over encoded remote information was pivotal in distributed computing to guarantee information protection and ease of use. To square unapproved information use, fine-grained get to control is vital in multi-client framework. Nonetheless, approved client may purposefully uncover the mystery key for monetary advantage. Along these lines, finding and revoking the pernicious client who manhandles mystery key should be illuminated quickly. In this paper, we propose an escrow free detectable property based numerous catchphrases subset look framework with adulterated off shoring unscrambling. The key escrow free instrument could adequately obstruct the Key Generation Center from unscrupulous seeking and decoding all scrambled records of clients. Additionally, the unscrambling procedure just requires ultra-lightweight calculation, which is a fundamental component for vitality constrained gadgets. What's more, efficient client denial is empowered after the malignant client is made sense of. Moreover, the proposed framework can bolster adaptable number of properties as opposed to polynomial limited. Adaptable numerous catchphrase subset look structure or organization is acknowledged and the difference in the question watchwords request does not have any effect to the query output.

Cite

CITATION STYLE

APA

Rao*, K. S., Anil, CH., … Bhavitha, Y. (2019). Vulnerability Tracking in Cloud using Encryption. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 925–927. https://doi.org/10.35940/ijrte.d7521.118419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free