Multi-Authority Identity-Based Encryption In Cloud Computing
Author(s):
B.Vinay Kumar, R.Bharath Kumar, P.Srinivas Rao
Keywords:
multi authority, key generation, security, cloud computing, signature
Abstract
The computing capability of resource-confined devicescan not be compared thereupon of laptop systems once a betteruseful resource worrying functions is to be disbursed. Withfine to laptop computers, mobile devices for example,are less powerful in computations like video streaming,teleconferencing and even decrypting information. during this paper we have a tendency to area unit proposedusually 3 ideas i.e. Multi authority of users,key generation, cryptography and secret writing of cloudstorage information. By manner of implementing multi authority ofclients in cloud methodology we have a tendency to area unit mistreatment identification baseddigital signature schema. an additional conception fornew unharness of key utilizing random code key generationsystem.In this paper encryption anddecryption methodology we're utilizing increased tinyencryption formula. during this paper we're alsoenforcing mailing principles for causing secondlevel. By suggests that of creating use of second degree we are able to get 1st stage forthe intent of information cryptography and secret writing
Article Details
Unique Paper ID: 144581
Publication Volume & Issue: Volume 3, Issue 12
Page(s): 250 - 254
Article Preview & Download
Share This Article
Conference Alert
NCSST-2021
AICTE Sponsored National Conference on Smart Systems and Technologies
Last Date: 25th November 2021
SWEC- Management
LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT