Secure Key-composite Cryptosystems through scatter Aggregate Keys for Global secured data
Author(s):
Bondugula Prashanth, M. sravanthi
Keywords:
Random oracle model, Privacy protecting cloud, Identity-based Cryptography, Data shar- ing protocol, AVISPA, Cloud computing,.
Abstract
Secure and efficient report garage and sharing through authenticated bodily devices remain challenging to attain in a cyber-physical cloud environment, particularly due to the variety of devices used to get right of entry to the offerings and records. Thus on this paper, we gift a light-weight identity-based totally authenticated information sharing protocol to offer at ease records sharing amongst geographically dispersed bodily gadgets and customers. The seasoned- posed protocol is verified to face up to selected-cipher text attack (CCA) beneath the hardness assumption of decisional-Strong Diffie- Hellman problem. We also evaluate the overall performance_of the proposed protocol with present facts sharing protocols in terms of computational overhead, communication overhead, and reaction time.
Article Details
Unique Paper ID: 147585

Publication Volume & Issue: Volume 5, Issue 9

Page(s): 104 - 107
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews