Abstract
Sensitive information modified should be firmly done to verify the integrity of cloud information, to stop it from being disclosed to or modified by unauthorized parties. Many enterprises supply information storage to the cloud mere a member of a company or information owner can merely share information with completely different members or users with confidentiality. The new public key aggregate policies that prove constant-size ciphertext wherever mere ciphertext unit labeled with sets of attributes and private keys unit associated with structures that management that user is able to decrypt. In several words, the key holder can unleash a constantsize aggregate key for versatile preferences of ciphertext set in cloud storage, but the other encrypted files outside the set keep secret to boot to authentication and privacy preservation this theme tries to satisfy all completely different security wants with key management and achieves higher quantifiability once the quantity of access levels can increase.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Innovative Research in Computer and Communication Engineering
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.