Identity-Based Encryption In Cloud Computing

Vankudovath Pandu, K.V.Nanda Kishore, I. Satyanarayana

Abstract


The computing capacity of resource-confined devicescan not be in comparison with that of computer systems when a betteruseful resource disturbing functions is to be carried out. Withfine to computer computers, mobile devices for instance,are less powerful in computations like video streaming,teleconferencing and even decrypting data. In this paper we are proposedusually three concepts i.e. Multi authority of users,key generation, encryption and decryption of cloudstorage data. By way of enforcing multi authority ofclients in cloud method we are using identification baseddigital signature schema. An extra concept fornew release of key utilizing random code key generationsystem.In this paper data encryption anddecryption method we're utilizing multiplied tinyencryption algorithm. In this paper we're alsoenforcing mailing principles for sending secondlevel. By means of making use of second degree we can get first stage forthe intent of data encryption and decryption.


Full Text:

PDF




Copyright (c) 2017 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org