Information Fortification, Confidentiality, Accessibility and Reliability in Cloud Computing: Issues and Present Solution (Record no. 16558)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | a |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220406115543.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 220406b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | AIKTC-KRRC |
| Transcribing agency | AIKTC-KRRC |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 16324 |
| Author | R. Priyadharsini |
| 245 ## - TITLE STATEMENT | |
| Title | Information Fortification, Confidentiality, Accessibility and Reliability in Cloud Computing: Issues and Present Solution |
| 250 ## - EDITION STATEMENT | |
| Volume, Issue number | Vol.8(1), Jan-Jun |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Nagercoil |
| Name of publisher, distributor, etc. | i-manager's |
| Year | 2021 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Pagination | 16-22p. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | fact that customers of remote cloud storage services do not have complete physical control of their data makes privacy data search a difficult task. Delegating access to the stored data and completing a search operation to a trusted party is a basic method. However, this does not scale well in practice, as full data access might easily compromise user privacy. We need to ensure the privacy of search contents, i.e., what a user wishes to search and what the server sends back to the user, to securely implement an effective solution. Furthermore, we must ensure that the outsourced data is kept private and that the user is not burdened with an additional local search burden. We present an efficient file modified Key Policy Attribute-Based Encryption technique (KP-ABE) in this paper. A modified Key-policy attribute-based encryption Encryption method is used by data owners to encrypt their confidential data for data recipients. The files could share the ciphertext components linked to characteristics. As a result, both ciphertext storage and encryption time are reduced. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| 9 (RLIN) | 4622 |
| Topical term or geographic name entry element | Computer Engineering |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 16327 |
| Co-Author | M. Ramya. |
| 773 0# - HOST ITEM ENTRY | |
| International Standard Serial Number | 2349-6835 |
| Title | i-manager's journal on cloud computing (JCC) |
| Place, publisher, and date of publication | Nagercoil i-manager Publication |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| URL | https://imanagerpublications.com/article/18457/ |
| Link text | Click here |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Articles Abstract Database |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | School of Engineering & Technology | School of Engineering & Technology | Archieval Section | 06/04/2022 | 2022-0701 | 06/04/2022 | 06/04/2022 | Articles Abstract Database |