Multi-Authority Identity-Based Encryption In Cloud Computing
Author(s):
B.Vinay Kumar, R.Bharath Kumar, P.Srinivas Rao
Keywords:
multi authority, key generation, security, cloud computing, signature
Abstract
The computing capability of resource-confined devicescan not be compared thereupon of laptop systems once a betteruseful resource worrying functions is to be disbursed. Withfine to laptop computers, mobile devices for example,are less powerful in computations like video streaming,teleconferencing and even decrypting information. during this paper we have a tendency to area unit proposedusually 3 ideas i.e. Multi authority of users,key generation, cryptography and secret writing of cloudstorage information. By manner of implementing multi authority ofclients in cloud methodology we have a tendency to area unit mistreatment identification baseddigital signature schema. an additional conception fornew unharness of key utilizing random code key generationsystem.In this paper encryption anddecryption methodology we're utilizing increased tinyencryption formula. during this paper we're alsoenforcing mailing principles for causing secondlevel. By suggests that of creating use of second degree we are able to get 1st stage forthe intent of information cryptography and secret writing
Article Details
Unique Paper ID: 144581

Publication Volume & Issue: Volume 3, Issue 12

Page(s): 250 - 254
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews