The security Cloud Storage Auditing with Key Generation Using ABE-An Implementation

P.Satish Goud, B.Ravinder Reddy, G.Vishnu Murthy

Abstract


Cloud Computing is a type of appropriated computing wherein assets and application stages are disseminated over the Internet through on request and pay on use premise. Many distributed storage encryption plans have been familiar with shield information from the people who don't approach. We make usage of many plans which acknowledged that distributed storage suppliers are ensured and secure. Be that as it may, by and by, a few specialists (i.e. coercers) may attempt to uncover data from the cloud without the authorization of the data proprietor. In this paper, we exhibit that the location of obscurity clients with the utilization of our productive deniable encryption conspire, while the phony clients tries to get data from the cloud they will be furnished with some phony files. With the goal that programmers can't hack the files from the cloud. Also, they are happy with their copy record by that way we can secure the proprietor mystery files or confidential files.


Full Text:

PDF




Copyright (c) 2018 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org