Multi-Authority Identity-Based Encryption In Cloud Computing

  • Unique Paper ID: 144581
  • Volume: 3
  • Issue: 12
  • PageNo: 250-254
  • Abstract:
  • The computing capability of resource-confined devicescan not be compared thereupon of laptop systems once a betteruseful resource worrying functions is to be disbursed. Withfine to laptop computers, mobile devices for example,are less powerful in computations like video streaming,teleconferencing and even decrypting information. during this paper we have a tendency to area unit proposedusually 3 ideas i.e. Multi authority of users,key generation, cryptography and secret writing of cloudstorage information. By manner of implementing multi authority ofclients in cloud methodology we have a tendency to area unit mistreatment identification baseddigital signature schema. an additional conception fornew unharness of key utilizing random code key generationsystem.In this paper encryption anddecryption methodology we're utilizing increased tinyencryption formula. during this paper we're alsoenforcing mailing principles for causing secondlevel. By suggests that of creating use of second degree we are able to get 1st stage forthe intent of information cryptography and secret writing
email to a friend

Cite This Article

  • ISSN: 2349-6002
  • Volume: 3
  • Issue: 12
  • PageNo: 250-254

Multi-Authority Identity-Based Encryption In Cloud Computing

Related Articles