Public Key Encryption Using Key Aggregate Cryptosystem

Abstract

Data contribution is an imperative functionality in cloud storage. For illustration bloggers can let their friends view a separation of their private pictures. An endeavour may contribution her employee’s contact to a segment of sensitive data. The demanding difficulty is how to efficiently share encrypted data. Of course users can download the encrypted data from the storage, decrypt them then send them to others for sharing but it loses the worth of cloud storage. Users should be capable to hand over the access rights of the sharing data to others so that they can way in these data from the server unswervingly. Though judgment a wellorganized and protected way to divide up biased data in cloud storage is not unimportant.

Authors and Affiliations

M Siri Madhavi, A Sowjanya Deepthi

Keywords

Related Articles

Business Analytics Focusing on Embeddable Reporting

The Business analytics is needed in Organizations where collection of data is increasingly large these data source need to be interpreted in an easy way to be able to make profitable decision in the limited time avai...

Design of Dadda Algorithm based Floating Point Multiplier

In this paper area efficient floating point multiplier is developed using Dadda Algorithm . For improving the speed of mantissa multiplication Dadda multiplier is used by replacing Carry Save Multiplier. The use of pr...

TPTD: Anonymization Of Large Scale Data Sets Using Map Reduce Jobs In Cloud

Cloud computing provides huge computation power and storage for users Forwarding their sensitive data for analysis or mining. Due to privacy issues Anonymizing datasets with kanonymity technique is used. But now a day...

Preventing Information Lose and Membership Disclosure on Highdimensional Data

The existing methods generalization and bucketization could not give a satisfactory result for privacy preserving on microdata. It results loss of information and some does not prevent the membership disclosure. In t...

Unauthorized Data Access Detection by Insertion of Duplicate Data Records

Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is be...

Download PDF file
  • EP ID EP28250
  • DOI -
  • Views 279
  • Downloads 3

How To Cite

M Siri Madhavi, A Sowjanya Deepthi (2015). Public Key Encryption Using Key Aggregate Cryptosystem. International Journal of Research in Computer and Communication Technology, 4(9), -. https://europub.co.uk/articles/-A-28250