Secure Data Sharing Using Two Fold Cryptography Key Protection, Proxy Re-encryption and Key Separation Techniques

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In Data transmissions Expertise, Data sharing in cloud storage is getting considerable responsiveness, as it could offer consumers using well-organized as well as operational storing facilities. The cryptographic methods are generally practiced for protecting the privacy of the collective complex information. On the other hand for information distribution, the information safety remains quiet posturing important encounters in cloud storage. How to defend as well as withdraw the cryptographic basic remains the essential trial amongst them. We recommend a novel information safety device for cloud storage for tackling this that embraces the resulting properties. 1) Using twofold aspects, the cryptographic basic remains safeguarded. The privacy of the cryptographic basic remains detained, on condition that one of the dual features works. 2) In incorporating the substitution re-encoding as well as basic departure methods, the cryptographic basic could remain withdrawn proficiently. 3) Through implementing the characteristic grounded encoding method, the information is endangered in a finegrained approach. Moreover, the safety inquiry as well as presentation assessment demonstrate that our suggestion remains safe as well as well-organized, correspondingly.

Cite

CITATION STYLE

APA

Uma Vishweshwar, D., BalaRam, A., & Kishore Babu, T. (2021). Secure Data Sharing Using Two Fold Cryptography Key Protection, Proxy Re-encryption and Key Separation Techniques. In Lecture Notes in Electrical Engineering (Vol. 698, pp. 299–305). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-7961-5_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free