Loading…
Self-destruction of data in cloud using asymmetric key with key generator
Individuals support the incredible intensity of distributed computing, however can't completely believe the cloud suppliers to have protection delicate information, because of the nonappearance of client to-cloud controllability. To guarantee privacy, information proprietors re-appropriate scra...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Individuals support the incredible intensity of distributed computing, however can't completely believe the cloud suppliers to have protection delicate information, because of the nonappearance of client to-cloud controllability. To guarantee privacy, information proprietors re-appropriate scrambled information rather than plaintexts. To impart the scrambled documents to different clients, Cipher text-Policy Attribute-based Encryption (CP-ABE) can be used to direct fine-grained and proprietor driven access control. This is accomplished by keeping key position framework and capacity hubs in two unique ways. Over an unreliable channel, an open key is produced alongside the comparing private key and give to number of clients independently. The Key gave is free of different keys for every clients. |
---|---|
ISSN: | 2214-7853 2214-7853 |
DOI: | 10.1016/j.matpr.2020.08.655 |