Privacy and Owner Authorization over encrypted data in cloud computing

Authors

  • Tejal Khandave Department of Computer Engineering, D Y Patil institute of engineering and technology, Ambi pune
  • Ashwini Madane Department of Computer Engineering, D Y Patil institute of engineering and technology, Ambi pune.
  • Aarti Bhoi Department of Computer Engineering, D Y Patil institute of engineering and technology, Ambi pune.
  • Kalpesh Zala Department of Computer Engineering, D Y Patil institute of engineering and technology, Ambi pune.
  • Prof.Rupali Adhau Department of Computer Engineering, D Y Patil institute of engineering and technology, Ambi pune

Keywords:

Public integrity auditing, dynamic data, victor commitment, group signature, cloud computing

Abstract

Explosive growth at intervals the vary of passwords for internet based totally applications and encryption keys for
outsourced info storage well exceed the management limit of users. Thus outsourcing keys to external watchword managers is
attracting the attention of the various users. However, existing solutions in current info outsourcing unit unable to at a similar time
meet the subsequent three security requirements for keys outsourcing. Beneath the framework, the key owner can perform privacy and
controllable authorization enforced encoding with minimum information discharge. To implement Cloud Key Bank expeditiously, a
spanking new science primitive named SC-PRE that mixes the techniques of HVE and PRE seamlessly, and propose a concrete
SCPRE
theme that support existing HVE and PRE schemes

Published

2017-06-25

How to Cite

Tejal Khandave, Ashwini Madane, Aarti Bhoi, Kalpesh Zala, & Prof.Rupali Adhau. (2017). Privacy and Owner Authorization over encrypted data in cloud computing. International Journal of Advance Research in Engineering, Science & Technology, 4(6), 35–40. Retrieved from https://ijarest.org/index.php/ijarest/article/view/1594