UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 6
June-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1908296


Registration ID:
225717

Page Number

941-948

Share This Article


Jetir RMS

Title

A Methodology For Secure Sharing Of File Records In The Cloud

Abstract

: Secure chase over combined a long way away measurements is primary in disseminated processing to assure the facts coverage and straightforwardness of utilization. To thwart unapproved actualities use, great-grained get admission to govern is crucial in multi-customer structure. Be that as it could, accepted purchaser may furthermore intentionally dispatch the spine chiller key for money associated gain. Along those strains, following and repudiating the vindictive customer who abuses backbone chiller key ought to be understood short. Execution examination with appreciate to time utilization indicates that the gadget would possibly be capable of use for undauntedly sharing the inside the cloud. Conjointly we are able to in popular Implement as a willpower at a few segment on this paper time Server, Secure Auditing Storage, in Time Server Owner include the begin and Ending time be a part of two moved Encrypted records. In this, we suggest an escrow loose perceptible characteristic fundamentally primarily based various catchphrases subset search shape with verifiable redistributed unscrambling. The key escrow free framework must as it should be avoid the important thing age attention from misleadingly searching and disentangling all blended facts of clients. Moreover, the unscrambling framework just requires especially lightweight computation, which is an attractive element for energy compelled devices. Moreover, effective customer repudiation is enabled after the threatening purchaser is made involvement.

Key Words

Access control, cloud computing, privacy, Secure Auditing Storage.

Cite This Article

"A Methodology For Secure Sharing Of File Records In The Cloud", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 6, page no.941-948, June 2019, Available :http://www.jetir.org/papers/JETIR1908296.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"A Methodology For Secure Sharing Of File Records In The Cloud", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 6, page no. pp941-948, June 2019, Available at : http://www.jetir.org/papers/JETIR1908296.pdf

Publication Details

Published Paper ID: JETIR1908296
Registration ID: 225717
Published In: Volume 6 | Issue 6 | Year June-2019
DOI (Digital Object Identifier):
Page No: 941-948
Country: kadapa, ap, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002795

Print This Page

Current Call For Paper

Jetir RMS