Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Secure Information Distribution in Cloud Computing


Affiliations
1 Department of CSE, V.R.S College of Engineering and Technology, Arasur, Villupuram, India
     

   Subscribe/Renew Journal


Cloud computing would be the supply involving computing services online. It allow persons and also corporations to utilize software and also equipment which are handled by simply 3 rd parties on distant destinations. Though the end user can't discuss sensitive info inside untrusted cloud as a result of lack of safety measures problems. With this document we offer safety measures towards the end user by the ways of encryption and also decryption. When the end user uploads the actual document, technique critical will be made by simply CP-ABE approach. This particular technique critical will be provided for highly regarded end user email no .. The person utilizes this critical pertaining to decryption in order to track one more critical, that may acquire particular document. A different factor in this document acquire and also publish charge involving sole end user and also collection could be represented as information.


Keywords

Wireless Circle, Facts Discussing, Cloud Research.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 197

PDF Views: 4




  • Secure Information Distribution in Cloud Computing

Abstract Views: 197  |  PDF Views: 4

Authors

C. Leena
Department of CSE, V.R.S College of Engineering and Technology, Arasur, Villupuram, India
A. Daison Raj
Department of CSE, V.R.S College of Engineering and Technology, Arasur, Villupuram, India
M. BalaAnand
Department of CSE, V.R.S College of Engineering and Technology, Arasur, Villupuram, India

Abstract


Cloud computing would be the supply involving computing services online. It allow persons and also corporations to utilize software and also equipment which are handled by simply 3 rd parties on distant destinations. Though the end user can't discuss sensitive info inside untrusted cloud as a result of lack of safety measures problems. With this document we offer safety measures towards the end user by the ways of encryption and also decryption. When the end user uploads the actual document, technique critical will be made by simply CP-ABE approach. This particular technique critical will be provided for highly regarded end user email no .. The person utilizes this critical pertaining to decryption in order to track one more critical, that may acquire particular document. A different factor in this document acquire and also publish charge involving sole end user and also collection could be represented as information.


Keywords


Wireless Circle, Facts Discussing, Cloud Research.