Information Fortification, Confidentiality, Accessibility and Reliability in Cloud Computing: Issues and Present Solution
By: R. Priyadharsini.
Contributor(s): M. Ramya.
Publisher: Nagercoil i-manager's 2021Edition: Vol.8(1), Jan-Jun.Description: 16-22p.Subject(s): Computer EngineeringOnline resources: Click here In: i-manager's journal on cloud computing (JCC)Summary: fact that customers of remote cloud storage services do not have complete physical control of their data makes privacy data search a difficult task. Delegating access to the stored data and completing a search operation to a trusted party is a basic method. However, this does not scale well in practice, as full data access might easily compromise user privacy. We need to ensure the privacy of search contents, i.e., what a user wishes to search and what the server sends back to the user, to securely implement an effective solution. Furthermore, we must ensure that the outsourced data is kept private and that the user is not burdened with an additional local search burden. We present an efficient file modified Key Policy Attribute-Based Encryption technique (KP-ABE) in this paper. A modified Key-policy attribute-based encryption Encryption method is used by data owners to encrypt their confidential data for data recipients. The files could share the ciphertext components linked to characteristics. As a result, both ciphertext storage and encryption time are reduced.Item type | Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Articles Abstract Database | School of Engineering & Technology Archieval Section | Not for loan | 2022-0701 |
fact that customers of remote cloud storage services do not have complete physical control of their data makes privacy data search a difficult task. Delegating access to the stored data and completing a search operation to a trusted party is a basic method. However, this does not scale well in practice, as full data access might easily compromise user privacy. We need to ensure the privacy of search contents, i.e., what a user wishes to search and what the server sends back to the user, to securely implement an effective solution. Furthermore, we must ensure that the outsourced data is kept private and that the user is not burdened with an additional local search burden. We present an efficient file modified Key Policy Attribute-Based Encryption technique (KP-ABE) in this paper. A modified Key-policy attribute-based encryption Encryption method is used by data owners to encrypt their confidential data for data recipients. The files could share the ciphertext components linked to characteristics. As a result, both ciphertext storage and encryption time are reduced.
There are no comments for this item.