Volume- 9
Issue- 6
Year- 2021
DOI: 10.55524/ijircst.2021.9.6.69 | DOI URL: https://doi.org/10.55524/ijircst.2021.9.6.69
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Sunaina Bagga
Numerous firm’s architectures management of data guarantees substantially alter method, gain access to maintain private commercial business. Occur additional facts protection problems. Existing statistics safety methods have limits in preventing records legal assaults, in particular these performed by utilizing companion diploma business executives to the cloud dealer to monitor data get right of entry to within the cloud and find out unusual records get right of entry to. Sorts require method of building a machine robust protection privateer’s statistic through files person team customer’s technique much documents. Not simply the encryption keys but also the search keys need to be utilized and consumers have to keep their keys resistant and disseminated. The cutting-edge current gadget the place the facts proprietor can solely share one key with the user, whether or not it is any kind of document, massive or small variety of documents, and the function of the person is to cross a lure in the cloud of overall performance checking out and safety evaluation of shared documents, which is an impenetrable and superb proposed gives schemes. And consumers are also extremely concerned about data sharing storage, inexplicable information leak in the cloud, and harmful attackers. In the article, an experiment is done to format a method for encryption for impenetrable statistics allocation.
[1]. Ma S, Huang Q, Zhang M, Yang B. Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Forensics Secur. 2015;10(3):458–70.
[2]. Dutta C, Singhal N. A cross validated clustering technique to prevent road accidents in VANET. In: Proceedings of the 2018 International Conference on System Modeling and Advancement in Research Trends, SMART 2018. 2018.
[3]. Singh P, Tyagi N. Radial Basis Function For Handwritten Devanagari Numeral Recognition. Int J Adv Comput Sci Appl. 2011;
[4]. Singh R, Singhal N. An enhanced vehicle parking management using artificial intelligence. In: Proceedings of the 2018 International Conference on System Modeling and Advancement in Research Trends, SMART 2018. 2018.
[5]. Jha A, Kumar M. Two wheels differential type odometry for mobile robots. In: Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization. IEEE; 2014. p. 1–5.
[6]. Sharma BK, Agarwal RP, Singh R. An efficient software watermark by equation reordering and FDOS. In: Advances in Intelligent and Soft Computing. 2012.
[7]. Goel S, Mamta. GA based trip attraction model for DUA. In: 2015 International Conference on Computing for Sustainable Global Development, INDIACom 2015. 2015.
[8]. Mehdi M, Ather D, Rababah M, Sharma MK. Problems issues in the information security due to the manual mistakes. In: Proceedings of the 10th INDIACom; 2016 3rd International Conference on Computing for Sustainable Global Development, INDIACom 2016. 2016.
[9]. Khan G, Gupta B, Gola KK. MDS3C: Modified digital signature scheme for secure communication. In: Advances in Intelligent Systems and Computing. 2017.
[10]. Jain A, Dwivedi R, Kumar A, Sharma S. Scalable design and synthesis of 3D mesh network on chip. In: Advances in Intelligent Systems and Computing. 2017.
[11]. Priya R, Belwal R. An analysis of resolution of deadlock in mobile agent system through different techniques. In: Advances in Intelligent Systems and Computing. 2017.
[12]. Li H, Liu D, Dai Y, Luan TH, Shen XS. Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Top Comput. 2015;
[13]. Shukla S, Agarwal AK, Lakhmani A. MICROCHIPS: A leading innovation in medicine. In: Proceedings of the 10th INDIACom; 2016 3rd International Conference on Computing for Sustainable Global Development, INDIACom 2016. 2016.
[14]. Shukla S, Lakhmani A, Agarwal AK. Approaches of artificial intelligence in biomedical image processing: A leading tool between computer vision & biological vision. In: Proceedings - 2016 International Conference on Advances in Computing, Communication and Automation, ICACCA 2016. 2016.
[15]. Pandey P, Joshi G, Gola KK. A zone based improved disk scheduling algorithm. In: Proceedings - 2016 International Conference on Advances in Computing, Communication and Automation, ICACCA 2016. 2016.
[16]. Tahira M, Ather D, Saxena AK. Modeling and evaluation of heterogeneous networks for VANETs. In: Proceedings of the 2018 International Conference on System Modeling and Advancement in Research Trends, SMART 2018. 2018.
[17]. Sengupta I, Kumar A, Kumar Dwivedi R. Study of SigmoidSpectral Composite Kernel based noise classifier with entropy in handling non linear separation of classes. In: 2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering, UPCON 2018. 2018.
[18]. Choudhary P, Dwivedi RK, Umang. A novel framework for prioritizing emergency vehicles through queueing theory. Int J Eng Adv Technol. 2019;
[19]. Gupta A, Pant V, Kumar S, Bansal PK. Bank loan prediction system using machine learning. In: Proceedings of the 2020 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020. 2020.
[20]. Zhu H, Wang L, Ahmad H, Niu X. Key-Policy Attribute-Based Encryption with Equality Test in Cloud Computing. IEEE Access. 2017;
[21]. Wang Q, Peng L, Xiong H, Sun J, Qin Z. Ciphertext-Policy Attribute-Based Encryption with Delegated Equality Test in Cloud Computing. IEEE Access. 2017;
[22]. Tseng YM, Tsai TT, Huang SS, Huang CP. Identity-based encryption with cloud revocation authority and its applications. IEEE Trans Cloud Comput. 2018;
[23]. Sun Y, Zhang F, Shen L, Deng RH. Efficient revocable certificateless encryption against decryption key exposure. IET Inf Secur. 2015;
[24]. Park S, Lee K, Lee DH. New constructions of revocable identity-based encryption from multilinear maps. IEEE Trans Inf Forensics Secur. 2015;
[25]. Li J, Li J, Chen X, Jia C, Lou W. Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput. 2015;
[26]. Li J, Yao W, Zhang Y, Qian H, Han J. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing. IEEE Trans Serv Comput. 2017;
RIMT University, Mandi Gobindgarh, Punjab, India (sunainabagga@rimt.ac.in)
No. of Downloads: 26 | No. of Views: 982
Wenxuan Zheng, Mingxuan Yang, Decheng Huang, Meizhizi Jin.
November 2024 - Vol 12, Issue 6
Siti Nur.
November 2024 - Vol 12, Issue 6
Ahmet Egesoy, Gulce Leylek.
November 2024 - Vol 12, Issue 6