Repository landing page

We are not able to resolve this OAI Identifier to the repository landing page. If you are the repository manager for this record, please head to the Dashboard and adjust the settings.

PROXY RE-ENCRYPTION SCHEMES FOR SECURE CLOUD DATA AND APPLICATIONS: A SURVEY

Abstract

This paper shows an overview on Proxy re-encryption procedures concerning secure cloud information and its application. To keep delicate client information secret against untrusted servers, crypto-realistic strategies are utilized to give security and access control in mists. As the information is shared over the system, it is should have been encoded. There are numerous encryption conspires that give security and access control over the network.Proxy re-encryption empowers the semi-confided in intermediary server to re-scramble the figure content encoded under Alice's open key to another ciphertext en-crypted under Bob's open key. The re-encryption is finished without the server having the capacity to decode the ciphertext.Cloud administrations and applications ought to take after the standard safety efforts in-cluding information secrecy, integrity,privacy, power and access control.In this paper the intermediary re-encryption(PRE) plans, Con-ditional PRE,Identity based PRE and Broadcast PRE,Type based PRE, Key private PRE,Attribute based PRE,Threshold PRE and its part in anchoring the cloud information are clarified

Similar works

Full text

thumbnail-image

International Journal of Innovative Technology and Research (IJITR)

redirect
Last time updated on 17/10/2019

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.