Loading…

Self-destruction of data in cloud using asymmetric key with key generator

Individuals support the incredible intensity of distributed computing, however can't completely believe the cloud suppliers to have protection delicate information, because of the nonappearance of client to-cloud controllability. To guarantee privacy, information proprietors re-appropriate scra...

Full description

Saved in:
Bibliographic Details
Main Authors: Prasanna, S., Chinnapparaj, S., Devi, D., Athithya Janani, A., Sophia, S.
Format: Conference Proceeding
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Individuals support the incredible intensity of distributed computing, however can't completely believe the cloud suppliers to have protection delicate information, because of the nonappearance of client to-cloud controllability. To guarantee privacy, information proprietors re-appropriate scrambled information rather than plaintexts. To impart the scrambled documents to different clients, Cipher text-Policy Attribute-based Encryption (CP-ABE) can be used to direct fine-grained and proprietor driven access control. This is accomplished by keeping key position framework and capacity hubs in two unique ways. Over an unreliable channel, an open key is produced alongside the comparing private key and give to number of clients independently. The Key gave is free of different keys for every clients.
ISSN:2214-7853
2214-7853
DOI:10.1016/j.matpr.2020.08.655