000 a
999 _c16558
_d16558
003 OSt
005 20220406115543.0
008 220406b xxu||||| |||| 00| 0 eng d
040 _aAIKTC-KRRC
_cAIKTC-KRRC
100 _916324
_aR. Priyadharsini
245 _aInformation Fortification, Confidentiality, Accessibility and Reliability in Cloud Computing: Issues and Present Solution
250 _aVol.8(1), Jan-Jun
260 _aNagercoil
_bi-manager's
_c2021
300 _a16-22p.
520 _afact that customers of remote cloud storage services do not have complete physical control of their data makes privacy data search a difficult task. Delegating access to the stored data and completing a search operation to a trusted party is a basic method. However, this does not scale well in practice, as full data access might easily compromise user privacy. We need to ensure the privacy of search contents, i.e., what a user wishes to search and what the server sends back to the user, to securely implement an effective solution. Furthermore, we must ensure that the outsourced data is kept private and that the user is not burdened with an additional local search burden. We present an efficient file modified Key Policy Attribute-Based Encryption technique (KP-ABE) in this paper. A modified Key-policy attribute-based encryption Encryption method is used by data owners to encrypt their confidential data for data recipients. The files could share the ciphertext components linked to characteristics. As a result, both ciphertext storage and encryption time are reduced.
650 0 _94622
_aComputer Engineering
700 _916327
_aM. Ramya.
773 0 _x 2349-6835
_ti-manager's journal on cloud computing (JCC)
_dNagercoil i-manager Publication
856 _uhttps://imanagerpublications.com/article/18457/
_yClick here
942 _2ddc
_cAR