Abstract

In this study, role re-encryption is employed in a secure role re-encryption system to minimize data leakage and deduplication. It also looks for evidence of ownership to see whether the user is an authorized one. This is for the sake of effectiveness. The role re-encryption approach involves sharing the access key for the associated authorized user in order to access a specific file without exposing personal information. We use both the avoid use of text and digital visuals in our endeavour. Personal photographs, for example, are stored on our mobile phones, portable devices, computers, and other gadgets. As these photographs must be kept confidential, we are encrypting them. Nowadays, the text file is equally significant for users. It must be kept safe on a cloud server. Digital photographs must be safeguarded during transmission, but personal identity information such as copies of a pan card, passport, ATM card, and so on, should be stored on a single wnpc. To minimize duplication in our proposed system, we are securing the text file and picture data.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call