Identity-Based Encryption Using Multi-Authority in Cloud Computing
Author(s):
YADAMAKANTI VINAY KUMAR, M.OMPRAKASH
Keywords:
multi authority, key generation, security, cloud computing, signature
Abstract
Identity-Based Encryption (IBE) which makes simple to the public key and credential management at Public Key Infrastructure (PKI) is a significant option to public key encryption. The computation capacity of resource-confined devices with that of computer systems can not be in comparison when a betteruseful resource disturbing functions is to be carried out. Withfine to computer computers, mobile devices for instance,are less powerful in computations like video streaming,teleconferencing and even decrypting data. In this paper we are proposedusually three concepts i.e. Multi authority of users,key generation, encryption and decryption of cloudstorage data. By way of enforcing multi authority ofclients in cloud method we are using identification baseddigital signature schema. An extra concept fornew release of key utilizing random code key generationsystem.In this paper data encryption anddecryption method we're utilizing multiplied tinyencryption algorithm. In this paper we're alsoenforcing mailing principles for sending secondlevel. By means of making use of second degree we can get first stage forthe intent of data encryption and decryption.
Article Details
Unique Paper ID: 144041
Publication Volume & Issue: Volume 3, Issue 5
Page(s): 202 - 206
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024