Affiliation:
1. Vellore Institute of Technology, Chennai, India
Abstract
Distributed computing provides flexible and informative information exchange and brings many benefits to both the general public and individuals. However, because the information often contains the most important data, there is a common lock that allows users to easily reuse cloud host information. Therefore, it is important for users to provide cryptographically enhanced access control to shared resources. Personality-based encryption is, for example, a promising encryption approach for building smart data sharing systems. Anyway, access to management is not a versatile solution. In such cases, if your permission is revoked from the database, it must be completely revoked from the cloud server, and you will not be able to retrieve your information once it has been revoked. It has many features of realizability, usefulness, and effectiveness and thus shows the correlation that shows the proposed method diagram used to build a practical and intelligent data provider structure.
Reference15 articles.
1. Identity-based encryption with efficient revocation.;A.Boldyreva;Proceedings of the 15th ACM conference on Computer and communications security,2008
2. Social Cloud Computing: A Vision for Socially Motivated Resource Sharing
3. Revocable identity-based encryption from lattices. Information Security and Privacy: 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012;J.Chen;Proceedings,2012
4. Key-aggregate cryptosystem for scalable data sharing in cloud storage.;C. K.Chu;IEEE Transactions on Parallel and Distributed Systems,2013
5. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security