EFFICIENT MULTI-LEVEL ENCRYPTION PROCEDURE FOR CLOUD SECURITY
نویسندگان
چکیده
منابع مشابه
Efficient-IBE (Identity based Encryption) based Cloud Data Storage Security Technique for Multi-user Inspection System
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, h...
متن کاملEfficient Multi-level Threshold Attribute Based Encryption
Anonymous access control is a very desirable property in various applications e.g. encrypted storage in distributed environments; and attribute based encryption (ABE) is a cryptographic scheme that is targeted to achieve this property. ABE is an encryption mechanism that is useful in settings where the list of users may not be known apriori, but all users may possess certain credentials which c...
متن کاملEncryption Based Security Model for Cloud Environment
In recent day, the enormous usage of cloud services leads to much concerned on cloud security. This paper primarily considers the important aspect of cloud security based on encryption. The users perform secure search on cloud environment using this method. Data stored in cloud are encrypted which ensure the privacy of the user; the files are encrypted before uploading. At the time of searching...
متن کاملHybrid Encryption for Cloud Database Security
In cloud computing environment the new data management model is in use now a days that enables data integration and access on a large scale cloud computing as a service termed as Database-as-a-service (DAAS). Through which service provider offers customer management functionalities as well as the expensive hardware. Data privacy is the major security determinant in DAAS because data will be sha...
متن کاملMulti-Recipient Encryption Schemes: Efficient Constructions and their Security
This paper proposes several new schemes which allow a sender to send encrypted messages to multiple recipients more efficiently (in terms of bandwidth and computation) than by using a standard encryption scheme. Most of the proposed schemes explore a new natural technique called randomness re-use. In order to analyze security of our constructions we introduce a new notion of multi-recipient enc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
سال: 2020
ISSN: 0973-8975,2454-7190
DOI: 10.26782/jmcms.2020.06.00031