| 000 | a | ||
|---|---|---|---|
| 999 |
_c16558 _d16558 |
||
| 003 | OSt | ||
| 005 | 20220406115543.0 | ||
| 008 | 220406b xxu||||| |||| 00| 0 eng d | ||
| 040 |
_aAIKTC-KRRC _cAIKTC-KRRC |
||
| 100 |
_916324 _aR. Priyadharsini |
||
| 245 | _aInformation Fortification, Confidentiality, Accessibility and Reliability in Cloud Computing: Issues and Present Solution | ||
| 250 | _aVol.8(1), Jan-Jun | ||
| 260 |
_aNagercoil _bi-manager's _c2021 |
||
| 300 | _a16-22p. | ||
| 520 | _afact that customers of remote cloud storage services do not have complete physical control of their data makes privacy data search a difficult task. Delegating access to the stored data and completing a search operation to a trusted party is a basic method. However, this does not scale well in practice, as full data access might easily compromise user privacy. We need to ensure the privacy of search contents, i.e., what a user wishes to search and what the server sends back to the user, to securely implement an effective solution. Furthermore, we must ensure that the outsourced data is kept private and that the user is not burdened with an additional local search burden. We present an efficient file modified Key Policy Attribute-Based Encryption technique (KP-ABE) in this paper. A modified Key-policy attribute-based encryption Encryption method is used by data owners to encrypt their confidential data for data recipients. The files could share the ciphertext components linked to characteristics. As a result, both ciphertext storage and encryption time are reduced. | ||
| 650 | 0 |
_94622 _aComputer Engineering |
|
| 700 |
_916327 _aM. Ramya. |
||
| 773 | 0 |
_x 2349-6835 _ti-manager's journal on cloud computing (JCC) _dNagercoil i-manager Publication |
|
| 856 |
_uhttps://imanagerpublications.com/article/18457/ _yClick here |
||
| 942 |
_2ddc _cAR |
||