Identity-Based Encryption Using Multi-Authority in Cloud Computing
Author(s):
YADAMAKANTI VINAY KUMAR, M.OMPRAKASH
Keywords:
multi authority, key generation, security, cloud computing, signature
Abstract
Identity-Based Encryption (IBE) which makes simple to the public key and credential management at Public Key Infrastructure (PKI) is a significant option to public key encryption. The computation capacity of resource-confined devices with that of computer systems can not be in comparison when a betteruseful resource disturbing functions is to be carried out. Withfine to computer computers, mobile devices for instance,are less powerful in computations like video streaming,teleconferencing and even decrypting data. In this paper we are proposedusually three concepts i.e. Multi authority of users,key generation, encryption and decryption of cloudstorage data. By way of enforcing multi authority ofclients in cloud method we are using identification baseddigital signature schema. An extra concept fornew release of key utilizing random code key generationsystem.In this paper data encryption anddecryption method we're utilizing multiplied tinyencryption algorithm. In this paper we're alsoenforcing mailing principles for sending secondlevel. By means of making use of second degree we can get first stage forthe intent of data encryption and decryption.
Article Details
Unique Paper ID: 144041

Publication Volume & Issue: Volume 3, Issue 5

Page(s): 202 - 206
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews