UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 7 Issue 4
April-2020
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2004563


Registration ID:
227975

Page Number

503-506

Share This Article


Jetir RMS

Title

Cryptographically Enforced Dynamic Access Control and traceable group data sharing in the Cloud

Abstract

Now a day’s people are using their smart phones for various purposes like uploading data, sharing data, use of online services, etc. along with their primary functions. But the problem with smart phones is that they are having limited computational and storage resources. Use of cloud computing in a mobile computing environment solves this problem which also increases the capacity of mobile devices. But the major concern about the use of cloud is the security issue which also becomes the problem in the mobile cloud computing environment. We proposed a light-weighted cryptographic mechanism a proxy re-encryption to solve the data integrity, data security issues in which users have to keep only short secret keys for all cryptographic operations in the mobile cloud without the involvement of any trusted third party. Group information sharing in cloud environments has become a boiling topic in modern decades. With the recognition of cloud computing, the way to reach secure associated economical information sharing in cloud environments is a pressing drawback to be resolved. Additionally, the way to reach each obscurity and traceability is a challenge within the cloud for information sharing. This paper focuses on sanctioning information sharing associated storage for a constant cluster within the cloud with high security and potency in an anonymous manner. By investment, the key agreement and therefore the cluster signature, a piece of unique traceable cluster information sharing theme is projected to support anonymous multiple users publically clouds. On the one hand, cluster members will communicate anonymously regarding the cluster signature, and therefore the real identities of members are traced if necessary.

Key Words

AES (Advance encryption standard) Algorithm, Keyword Extraction, Group data sharing, ECC (elliptic curve cryptography

Cite This Article

"Cryptographically Enforced Dynamic Access Control and traceable group data sharing in the Cloud", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 4, page no.503-506, April 2020, Available :http://www.jetir.org/papers/JETIR2004563.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Cryptographically Enforced Dynamic Access Control and traceable group data sharing in the Cloud", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 4, page no. pp503-506, April 2020, Available at : http://www.jetir.org/papers/JETIR2004563.pdf

Publication Details

Published Paper ID: JETIR2004563
Registration ID: 227975
Published In: Volume 7 | Issue 4 | Year April-2020
DOI (Digital Object Identifier):
Page No: 503-506
Country: pune, Maharastra, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003087

Print This Page

Current Call For Paper

Jetir RMS