Public Key Encryption Using Key Aggregate Cryptosystem
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 9
Abstract
Data contribution is an imperative functionality in cloud storage. For illustration bloggers can let their friends view a separation of their private pictures. An endeavour may contribution her employee’s contact to a segment of sensitive data. The demanding difficulty is how to efficiently share encrypted data. Of course users can download the encrypted data from the storage, decrypt them then send them to others for sharing but it loses the worth of cloud storage. Users should be capable to hand over the access rights of the sharing data to others so that they can way in these data from the server unswervingly. Though judgment a wellorganized and protected way to divide up biased data in cloud storage is not unimportant.
Authors and Affiliations
M Siri Madhavi, A Sowjanya Deepthi
Business Analytics Focusing on Embeddable Reporting
The Business analytics is needed in Organizations where collection of data is increasingly large these data source need to be interpreted in an easy way to be able to make profitable decision in the limited time avai...
Design of Dadda Algorithm based Floating Point Multiplier
In this paper area efficient floating point multiplier is developed using Dadda Algorithm . For improving the speed of mantissa multiplication Dadda multiplier is used by replacing Carry Save Multiplier. The use of pr...
TPTD: Anonymization Of Large Scale Data Sets Using Map Reduce Jobs In Cloud
Cloud computing provides huge computation power and storage for users Forwarding their sensitive data for analysis or mining. Due to privacy issues Anonymizing datasets with kanonymity technique is used. But now a day...
Preventing Information Lose and Membership Disclosure on Highdimensional Data
The existing methods generalization and bucketization could not give a satisfactory result for privacy preserving on microdata. It results loss of information and some does not prevent the membership disclosure. In t...
Unauthorized Data Access Detection by Insertion of Duplicate Data Records
Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is be...