Gongcheng Kexue Yu Jishu/Advanced Engineering Science

Title : Effective File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
EDIGA KISHORE KUMAR GOWD, VIJAYA BHASKAR MADGULA, KUMMARA RANGA SWAMY

Abstract :

To manage the exponential growth of shared data, cloud computing has emerged as a top contender among application platforms. Users should encrypt their data before sharing it in order to keep it safe on the cloud. By using the cloud, customers with limited computer capabilities may access massive amounts of processing power, bandwidth, storage, and even relevant software that can be shared on an as-needed basis, all while paying for what they really need. As the first barrier against unauthorised access to shared information, access management is of the utmost importance. On the one hand, sensitive data includes outsourced computation tasks, which may contain things like business financial records, private research data, and personally identifiable health information. Encrypting sensitive data before outsourcing it is essential for preventing illicit data leaks and assuring end-to-end security. guarantee the security of data stored online and elsewhere. Important exposur

Journal Visit

Top Visit

Medium Visit

Less Visit

Not Visit