Public Key Encryption Using Key Aggregate Cryptosystem

Abstract

Data contribution is an imperative functionality in cloud storage. For illustration bloggers can let their friends view a separation of their private pictures. An endeavour may contribution her employee’s contact to a segment of sensitive data. The demanding difficulty is how to efficiently share encrypted data. Of course users can download the encrypted data from the storage, decrypt them then send them to others for sharing but it loses the worth of cloud storage. Users should be capable to hand over the access rights of the sharing data to others so that they can way in these data from the server unswervingly. Though judgment a wellorganized and protected way to divide up biased data in cloud storage is not unimportant.

Authors and Affiliations

M Siri Madhavi, A Sowjanya Deepthi

Keywords

Related Articles

Design of Low Power SAR-ADC in 0.18μm Mixed-Mode CMOS Process

This paper presents an energy efficient successive-approximation-register (SAR) analog-todigital converter (ADC) for biomedical applications.For low-power applications designer needs to come up with a compromise among...

Efficient Defence System For Avoid Malware Propagation In Mobile Network

We investigate the problem of how to optimally distribute the content-based signatures of malware, which helps to detect the corresponding malware and disable further propagation, to minimize the number of infected n...

Blind Watermarking Scheme for Un-Compressed Video Using RBF Neural Network

Robust watermarking is one of the major multimedia processing applications which is specifically important for compressed and uncompressed video for copyright protection, content authentication and broadcasting. In t...

Advanced Power Allocation in OFDM Systems

In this project, we propose a power allocation strategy by utilizing the duality gap in OFDM systems for the maximization of the sum of data rates at all subcarriers. In order to achieve the maximum capacity, the prop...

Integrity And Confidentiality for Network Security

We compute the liability metric as a function of the steering and the cryptographic protocols used to secure the complex passage. We formulate the minimum cost node capture attack problem as a nonlinear integer progra...

Download PDF file
  • EP ID EP28250
  • DOI -
  • Views 274
  • Downloads 3

How To Cite

M Siri Madhavi, A Sowjanya Deepthi (2015). Public Key Encryption Using Key Aggregate Cryptosystem. International Journal of Research in Computer and Communication Technology, 4(9), -. https://europub.co.uk/articles/-A-28250