About this Journal  |  Author Guidelines  |   Submit a Manuscript     

International Journal of Advanced Research in Computer and Information Security

Volume 1, No. 1, 2017, pp 13-18
http://dx.doi.org/10.21742/ijacis.2017.1.1.03

Abstract



Encrypting the Data in Cloud Computing



    Reddi Prasadu
    1100-100 Department of Information Technology, Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra Pradesh-531162, India

    Abstract

    Identity-based cryptography (ibe) that simplifies the final public key and certificate management at public key infrastructure (pki) may be a crucial numerous to public key cryptography. However, one in every of the foremost efficiency drawbacks of ibe is that the overhead computation at [1] personal key generator (pkg) throughout user revocation. Throughout this paper, aiming at managing the necessary issue of identity revocation. This goal is achieved by utilizing a totally distinctive collusion-resistant technique: we've an inclination to use a hybrid personal key for each user, among that Associate in Nursing logic gate is bothered to connect and sure the part and additionally the time element. Moreover, we've an inclination to propose another construction that's demonstrable secure to a lower place the recently formulized Refereed Delegation of Computation model. Finally, we provide thorough experimental results to demonstrate the efficiency of our planned construction.


 

Contact Us

  • PO Box 5074, Sandy Bay Tasmania 7005, Australia
  • Phone: +61 3 9028 5994