Open Access Open Access  Restricted Access Subscription or Fee Access

Cellular automata Signature Based Data Sharing in Cloud Computing

Kiran Sree

Abstract


Information sharing plan by utilizing credit based to decrease the key escrow issue yet additionally builds up the expressiveness of trait, as a result of that the subsequent plan is more easy to understand to distributed computing. In our proposed structure, we are introducing an improved two-party key issuing tradition that can guarant1ee that neither key pro nor cloud advantage executive can exchange off the whole riddle key of a customer independently. We exhibit the possibility of property with weight, being given to enhance the assertion of value, which can't simply extend the enunciation from twofold to optional state, yet what's more help the multifaceted idea of access approach. So that, both cutoff cost and encryption complexities for a figure content are calmed. The issue of noxious cloud insider still proceeds on. Envision the setting of an electronic success records structure. An embraced client can get to the thriving record fulfilling their self-decided requirements depict by the information proprietor.

Full Text:

PDF

References


J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang, "A protected distributed computing based structure for enormous information data administration of keen network," IEEE Trans. Cloud Comput., vol. 3, no. 2, pp. 233– 244, Apr./Jun. 2015.

A. Balu and K. Kuppusamy, "An expressive and provably secure ciphertext-strategy property based encryption," Inf. Sci., vol. 276, no. 4, pp. 354– 362, Aug. 2014.

M. Belenkiy, J. Camenisch, M. Pursue, M. Kohlweiss, A. Lysyanskaya, and H. Shacham, "Randomizable confirmations and delegatable unknown qualifications," in Proc. 29th Annu. Int. Cryptol. Conf., 2009, pp. 108– 125.

J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-strategy attributebased encryption," in Proc. IEEE Symp. Secur. Security, May 2007, pp. 321– 334.

D. Boneh, B. Lynn, and H. Shacham, "Short marks from the Weil matching," J. Cryptol., vol. 17, no. 4, pp. 297– 319, 2004.

M. Pursue, "Multi-expert property based encryption," in Proc. fourth Conf. Hypothesis Cryptogr., 2007, pp. 515– 534.

M. Pursue and S. S. M. Chow, "Enhancing protection and security in multiauthority property based encryption," in Proc. sixteenth ACM Conf. Comput. Commun. Secur., 2009, pp. 121– 130.


Refbacks

  • There are currently no refbacks.